Skip to content

Kim Drinkall

9 Common Ways Password Security is Breached

Businesses face numerous password security challenges, including phishing, malware, brute force attacks, and more, necessitating robust cyber security measures, employee..

Read More

Beyond On-Prem: Your Cloud Migration Roadmap

Beyond On-Prem: Your Cloud Migration Roadmap

Thinking about transitioning from on-prem to the cloud, but not sure of what that process looks like? This blog is for you. We at Wicresoft are at the forefront of modernising and..

Read More

Why Relying on Outdated Technology Can Be Detrimental to Your Business

When businesses make the effort to guard themselves against growing and evolving cyber threats, they often think of things like email security, malware protection, and other..

Read More

This Blog Contains a QR Code for Free Ice Cream

Scanners Beware: The Cyber Security Challenges of QR Codes

From scanning to access restaurant menus to finding out ‘more information’ on television adverts, the power of QR codes is undeniable. In fact, during the 2023 Super Bowl, over 20..

Read More

Cyber Security Lessons Learned from the Las Vegas Cyberattack

Cyber Security Lessons Learned from the Las Vegas Cyberattack

We’ve been discussing how cyberattacks are continuously on the rise as the world becomes ever more digital. During our Cyber Security Awareness month, a prime example has..

Read More

5 Steps to Build Business Resilience and Recover from Cyber Attacks

5 Steps to Build Business Resilience and Recover from Cyber Attacks

Businesses of all sizes face the constant threat of cyber attacks. These attacks can cause significant financial losses and reputational damage, making it essential for companies..

Read More