Webinars and Insights from Industry-leading Professionals
Optimizing your Security and Compliance with M365
Watch our Techtalk where we guide you through core security and governance features of M365, as well as how these can benefit your organization. Topics covered include:
- Device and App Management
- Identity and Access management
- Threat Protection
- Information Protection
- Security Management
What is Cyber Essentials and why should it be part of your security strategy?
Join our informative and engaging virtual session to find out how to get started, as well as the following:
- How to get started with your Cyber Essentials certification
- What are the five things you should know before you start
- What is a threat and vulnerability assessment, and why is it important to do one?
- How Wanstor can help ensure you are adhering to the Cyber Essentials standard
The Future of the Agile Workplace
We’ve teamed up with Microsoft and Fujitsu for our new Techtalk in understanding how technology can help drive your business forward in this new, agile way of working, covering the following topics:
- The future of work: the good, challenging and unknown
- The right infrastructure to support your business post-Covid
- Adapting to flexible working
- How to take your business from functioning to game-changing with Microsoft Power Platform
- Saxton Bampfylde's journey with Microsoft Power Platform
Phishing: Don't Get Caught
Cybercrime, and in particular Phishing attacks, have risen astronomically since lockdown began and users started working from home. Our Experts guide you through:
- What are the most common hacking techniques?
- Don’t get caught by a phishing campaign: Live Demo
- Hints and Tips for staying safe online
- What do you do in the event of a suspected hack?
- Cyber Essentials best practice
Chat to one of our Solution Experts about how technology can enable your business.
Why should you undertake a Threat and Vulnerability Assessment?
- External scan of your network and infrastructure
- Identify known vulnerabilities and readily available exploits
- Receive tailored recommendations and remediation actions