By continuing to use the site, you agree to the use of cookies. more information
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.
The Threats of Social Engineering
Find out about the danger that social engineering poses, and how to protect you and your business.
Email Security Should be Seen as the Most Important Security Feature to any Business
Read ethical hacker Jed’s thoughts on just how important proper email security is, and how you can make sure your system is fully secured.
PC Video Connection Guide
Find out how to easily identify which video connections your systems use, and how each sort of connection works
Chris, the Kogo Dispatcher
Find out about the role of the dispatcher in the Kogo support process, and how Kogo’s dispatcher Chris makes Kogo support run smoothly