fbpx

Octagon Technology

Sender Policy Framwork

Sender Policy Framework – Phishing Email Primer (pt.10)

In the digital age, where business communication is predominantly conducted via email, the security and authenticity of these communications cannot be overstated. A correct business email setup, including Sender Policy Framework (SPF) records, is not just a technical detail but a fundamental aspect of a company’s online presence and reputation. SPF records are a type […]

Sender Policy Framework – Phishing Email Primer (pt.10) Read More »

Old Hard Drive

Safely Disposing of Old Hard Drives: Protecting Your Data and the Environment

As technology evolves, we find ourselves upgrading our gadgets and devices more frequently. Whether it’s a new laptop, smartphone, or external hard drive, the old ones often end up collecting dust in a drawer. But what about the sensitive data stored on those old hard drives? How can we ensure that our personal information doesn’t

Safely Disposing of Old Hard Drives: Protecting Your Data and the Environment Read More »

Father’s Day Gifts

Is your Dad a Geek?

We’re back, with the essential geek present list for Father’s Day. For those of you who have forgotten when it is, here is a reminder – Sunday, 16 June 2024 Big enough? This list is mainly for fun – there are no affiliate links – and hopefully inspiration for more unusual presents than you normally

Is your Dad a Geek? Read More »

Effective Communication

Effective Communication

Effective communication with your IT provider is a critical component of any business’s operational strategy. In today’s fast-paced digital world, where technology underpins almost every aspect of a company, having a clear and open channel with those who manage your IT infrastructure is not just beneficial, it’s essential. It ensures that IT services align with

Effective Communication Read More »

Hey! You with all the hats!

If you are a business owner, you wear many hats, particularly whilst your company is growing.  Big corporates can employ specialists – management accountants, financial accountants, tax specialists, contracts lawyers, employment lawyers, recruitment specialists, marketing gurus – and the list goes on. You have to be all of those people, so how do you find

Hey! You with all the hats! Read More »

device encryption

Keep It Simple… Encryption (pt. 3)

Encryption is the process of encoding information, converting it from plaintext into ciphertext, to protect it from unauthorised access. This process ensures that only those with the appropriate decryption key can access the original information, thereby maintaining confidentiality. Modern encryption techniques utilise complex algorithms and keys, making unauthorised decryption extremely difficult without the correct key.

Keep It Simple… Encryption (pt. 3) Read More »