Stay Tuned!

Subscribe to our newsletter to get our newest articles instantly!

Apps

What are the Verification steps for Accessing Citrix ShareFile

  • 5 July 2022
  • 0 Comments

Background We gave access to a particular folder within the client extranet in Citrix ShareFile to multiple organisations. The process is straightforward; a small proportion of users cannot access this. Solution Here’s the step-by-step: Account Verification First, you receive confirmation from the Citrix ShareFile administrator that they give you access. Check your email from [email protected], […]

Security

How Secure is the Email Connection from End to End

  • 5 July 2022
  • 0 Comments

Background There was a perception the email was somehow not secure end to end, and the hacker could sniff around the email package. Solution Most of the email servers, the hosted one especially, implemented the Transport Layer Security (TLS), a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely […]