Yusra Shaeik

What is Single Sign-On (and why might your business need it)?

One password for this app. Another for that device. An IT team constantly fielding login reset requests. If that’s your business’s daily reality, Single Sign-On could be just the thing you’re looking for. This already widely-used authentication scheme means you only need a single ID to log onto a whole bunch of individual (though related)

Is AI all hype? DAG in promotional script snafu

You know the drill. Your business is launching new services. How will you market them? At Dial A Geek, we thought we’d get ChatGPT to give us a clue. It left us thinking: is AI all hype? Because the result we got back when asking for a one-minute promotional video script was… Well. It was

Advanced threat protection against phishing: how to protect your business

Over 9 out of 10 cyber attacks start with an “innocent” email. That’s why it’s vital that you have advanced threat protection against phishing in place and ready to protect your business. Because, unfortunately, the human link in your cybersecurity chain is almost always weaker than your other defences. Your first fix is easy, of

Google Meet vs Teams – what’s better for business use?

Work from home cybersecurity with MFA and SSO

Google Meet vs Teams. It’s become a perennial question for decision-makers. Out of the two big names in workplace collaboration, what’s better for business use? Let’s take a look at it from a couple of different angles: Is Google Meet better than Microsoft Teams? This is one of the most common ways to phrase the

Cybersecurity vs compliance – do you know how they differ?

Cybersecurity and compliance are terms that are often used interchangeably. You can see why. Both are all about helping you manage your organisation’s digital security. But – and this is a big but – each has a very different motivation, focus, and methods attached to it: Compliance is driven by business needs. It’s often designed

What is penetration testing (and who should do it)? 

Do you need to be absolutely sure there are zero holes in your cybersecurity protections that an attacker could exploit? If so, learning what penetration testing is all about might be for you. But penetration testing isn’t for everyone. Smaller businesses can often get by without this kind of intensive, active test of their cybersecurity.

What is ISO 27001, why have it, who needs it, how to get it

ISO 27001 and cybersecurity compliance

If you want to protect your business’s information, it’s an ideal standard to meet. But what is ISO 27001 really? Why would you want it? Who would benefit from it? How do you get it? Let’s take a look at why this internationally accepted standard for Information Security is so valuable for businesses in every

Have you ticked off your end of year office IT checklist?

It’s beginning to feel a lot like… time to turn everything off before you high-tail it for the snowy hills. But have you ticked off your end of year office IT checklist? Before you sign off for Christmas, make sure you’ve done all of the following: Your end of year IT checklist 1) Turn off

SharePoint vs OneDrive – what’s the difference?

Microsoft has long led the way in developing collaboration tools for the remote workplace. But at least two of their offerings sound very similar. So, SharePoint vs OneDrive – what’s the difference? Because both store information on the cloud. Both can be accessed from anywhere. Both come with every installation of Microsoft 365 and Enterprise…