TKS Newsletter – 2026 January
We’re entering the era of agentic AI. Smart, autonomous systems that don’t only assist people, but act on their behalf. Unlike traditional tools that wait for someone to click, type or browse, agentic AI can read data, talk to other systems, and complete entire tasks end-to-end.
TKS Newsletter – 2025 December
Cyber criminals haven’t gone back to normal. In fact, phishing, where a scammer tricks you into clicking a link or giving away details like passwords or bank information, still accounts for around 15% of all data breaches.
TKS Newsletter – 2025 November
What separates the businesses that recover quickly from those that don’t isn’t luck. It’s preparation. Hackers have become very good at sneaking in, stealing data, and causing disruption. Even strong security can’t block every attempt. That’s why having a recovery plan matters so much.
TKS Newsletter – 2025 October
It happens far too often. An SMB believes its cybersecurity is under control until a routine check uncovers something unexpected, like an old piece of malware quietly running in the background. Or a phishing attack that slipped through weeks ago. These incidents don’t usually involve cutting edge hackers or advanced tools. They succeed because simple, everyday safeguards have been missed.
TKS Newsletter – 2025 September
Scammers are posing as jobseekers on LinkedIn to target business owners with dangerous malware. They create fake profiles and realistic resume websites that seem safe but are designed to trick people into downloading a hidden backdoor called “More Eggs.” This malware can steal passwords, run commands, and install more malicious software. It’s a sophisticated scam that relies on gaining trust first.
TKS Newsletter – 2025 August
Here’s our August 2025 Newsletter Read the full PDF version here: The TKS Sentinel – August Issue In this month’s edition, we discuss: Social Engineering attacks Geniune Password Managers PDF […]
TKS Newsletter – 2025 July
Here’s our July 2025 Newsletter Read the full PDF version here: The TKS Sentinel – July Issue In this month’s edition, we discuss: Cloud Storage Cost Risky Device Blocking Windows […]
TKS Newsletter – 2025 June
Here’s our June 2025 Newsletter Read the full PDF version here: The TKS Sentinel – June Issue In this month’s edition, we discuss: Responsible AI Use PC Crashes Windows 11 Features […]
TKS Newsletter – 2025 May
Here’s our May 2025 Newsletter Read the full PDF version here: The TKS Sentinel – May Issue In this month’s edition, we discuss: Cloud Security Teams Calls Mobile Outlook Features […]
TKS Newsletter – 2025 April
Here’s our April 2025 Newsletter Read the full PDF version here: The TKS Sentinel – April Issue In this month’s edition, we discuss: Fake Google Ads Insider Threats MS Copilot […]
TKS Newsletter – 2025 March
Here’s our March 2025 Newsletter Read the full PDF version here: The TKS Sentinel – March Issue In this month’s edition, we discuss: Cybersecurity Planning Microsoft Trashes Passwords Tech Facts […]
TKS Newsletter – 2025 February
Here’s our February 2025 Newsletter Read the full PDF version here: The TKS Sentinel – February Issue In this month’s edition, we discuss: Work-Specific Tools Windows 11 Features Tech Facts […]
TKS Newsletter – 2025 January
Here’s our January 2025 Newsletter Read the full PDF version here: The TKS Sentinel – January Issue In this month’s edition, we discuss: New Tech Tools Malicious Request Tech Facts […]
TKS Newsletter – 2024 December
Here’s our December 2024 Newsletter Read the full PDF version here: The TKS Sentinel – December Issue In this month’s edition, we discuss: Ransomware Threats PDF Hijacking Tech Facts & […]
TKS Newsletter – 2024 November
VoIP, an acronym for Voice over Internet Protocol. It’s a reliable technology. You make phone calls using data sent over the internet. You can use a desk phone for this, or your computer or cell. Cloud Telephony takes things a step further. It uses VoIP technology but operates entirely in the cloud.
TKS Newsletter – 2024 October
Meet Joe, a business owner who’s seen his company grow impressively over the years. With a team spread across various locations, Joe invested in a Unified Communication (UC) system to keep everyone connected. Video calls, instant messaging, and shared documents all in one place made collaboration smooth and efficient. But one morning, as Joe sat at his desk, his worst nightmare began to unfold.
TKS Newsletter – 2024 September
Cyber extortion is when cyber criminals threaten to damage, steal, or expose a business’s digital data unless a ransom is paid. And the number of victims has grown 77% year on year. In the US attacks have risen by 108% and any business of any size is targeted. To stay better protected, the usual advice applies: Make sure all software is up to date, back up your data, and implement multi-factor authentication (where you get a code on another device to prove it’s you).
TKS Newsletter – 2024 August
Have you heard of zero-click exploits? Zero-click exploits are a type of cyber attack that can hit your device without you even clicking on anything. Yep, that means anyone can fall victim. They usually target messaging or voice-calling apps, using hidden messages or files to slip malware onto your device. Since these attacks don’t leave much evidence, they’re tough to spot. To stay safe, make sure your software is always updated and make sure your team doesn’t open messages or take calls from unknown senders.
TKS Newsletter – 2024 July
Did you know that Microsoft if serious about security? Cybersecurity is crucial and Microsoft knows that more than most. Now the tech giant has upped the ante, tying executives' pay to security performance.
TKS Newsletter – 2024 June
Here’s our June 2024 Newsletter Read the full PDF version here: The TKS Sentinel – June Issue In this month’s edition, we discuss: Remote Employees Email Send Limit Microsoft Updates […]