• cloud-banner-2
  • blog-banner-roadmap-1

TDLogicalisBlog

Find me on:

Recent Posts

How to get Complete Visibility of your Cloud Costs in Azure

 

How to get Complete Visibility of your Cloud Costs in Azure

One of the key reasons organisations are moving to public cloud is to take advantage of the flexible payment model. Your upfront fees...

Continue Reading ››

Tags Cloud, cloud backup, cloud computing, IT consultation, cloud approach, cloud infrastructure, cloud partner, Azure, Microsoft, Public Cloud

Logicalis Recognised as an Industry Leader in IDC

 

Logicalis Recognised as an Industry Leader in IDC

The IDC MarketScape report assesses the capabilities and strategies of many prominent network consulting firms, and to be recognised and...

Continue Reading ››

Tags Cloud, IT consultation, IDC, Logicalis, Industry Leader

White Hat Hacking with TDL | Another Breach for the Health Sector!

 

Medical Records exposed in Health Sector Cyber Attacks

 A Cyberattack on the Melbourne Heart Group, a specialist cardiology unit at Cabrini Hospital in Malvern, made news headlines on Thursday....

Continue Reading ››

Tags Security, cyber security, Privacy, Phishing, Databreach, OAIC, Cybercriminals, Human Error, Malware, Malicious Attacks, Attackers, Cybersecurity, Vulnerability, Breach, Scam, Scammers, Flaw, Encryption, Health Sector, Fraudulent Activity, RDP, Threat Actor, Dot-Accounts, Government, Federal Government, ASIO, Intelligence Agencies, Russian Hackers, Hackers, Interference, Personally Identifiable Information, Chinese Hackers, Hack, PII

White Hat Hacking with TDL | Government Acknowledges Hack on Parliament

 

Federal Government Acknowledge Hack on Parliament by ‘Sophisticated State Actor’

The Australian Government’s acknowledgement yesterday that a ‘sophisticated state actor’ was to blame for a...

Continue Reading ››

Tags Security, cyber security, Privacy, Phishing, Databreach, OAIC, Cybercriminals, Human Error, Malware, Malicious Attacks, Attackers, Cybersecurity, Vulnerability, Breach, Scam, Scammers, Flaw, Encryption, Fraudulent Activity, RDP, Threat Actor, Dot-Accounts, Government, Federal Government, ASIO, Intelligence Agencies, Russian Hackers, Hackers, Interference, Personally Identifiable Information, Chinese Hackers, Hack, PII

1 2 3 4 5
... 7 »

FOLLOW BLOG VIA EMAIL

Align your business strategies with the business goals