KRACK Attack: How Secure are Your Wi-Fi Connections

KRACK Attack: How Secure are Your Wi-Fi Connections

“The security protocol used to protect the vast majority of Wi-Fi connections has been broken, potentially exposing wireless internet traffic to malicious eavesdroppers and attack”, according to Mathy Vanhoef, a cybersecurity researcher of KU Leuven in Belgium who...
Managed Services and the importance of right sourcing

Managed Services and the importance of right sourcing

Managing the people, processes, and toolsets of your ICT operations is complex, time-consuming, costly and distracting. Internal systems and capabilities take time to build and are expensive to maintain – particularly in new or specialized domains. Yet, you need to...
SIGNAL ALLIANCE ACHIEVES CISCO GOLD CERTIFICATION

SIGNAL ALLIANCE ACHIEVES CISCO GOLD CERTIFICATION

Signal Alliance, a leading systems integrator in cloud advisory, enterprise infrastructure, IT security, managed services and business applications, today announced it has achieved Cisco Gold Certification. To earn Gold Certification, Signal Alliance had to meet...
Answers to common Microsoft Office365 questions.

Answers to common Microsoft Office365 questions.

1) Some links may not be active immediately after you sign up for Microsoft Office 365 Answer: This is because the service is still provisioning your account and some resources are not ready to use. When provisioning is complete, the color of these links will change...
Achieving competitive advantage using business analytics

Achieving competitive advantage using business analytics

Business analytics is becoming more relevant as the days go by. Data volumes are exploding—from traditional point-of-sale systems and e-commerce websites to new customer sentiment sources like Twitter and IoT sensors that stream data in real time. Today’s high-tech,...
Our Cyber Security portfolio

Our Cyber Security portfolio

Cyber-security has never been simple. And because attacks evolve every day as attackers become more inventive, it is critical to properly define your cyber-security strategy Corporate IT teams have been under a great deal of pressure since a spate of massive data...