Josh Trowern
Unleashing the Potential of SMEs with Generative AI and Vissensa’s Expertise
[kc_row _id=”978416″][kc_column width=”12/12″ video_mute=”no” _id=”4834″][kc_column_text _id=”123803″]In the age of digital transformation, small and medium-sized enterprises (SMEs) are finding new ways…
Microsoft Unveils AI-Powered Copilot+ PCs
[kc_row _id=”573561″][kc_column width=”12/12″ video_mute=”no” _id=”428740″][kc_column_text _id=”158895″]Microsoft recently unveiled the groundbreaking Copilot+ PCs. These new Windows PCs represent a leap forward…
Microsoft Build 2024 – The Big Announcements
[kc_row _id=”112871″][kc_column width=”12/12″ video_mute=”no” _id=”83722″][kc_column_text _id=”952652″]Announcements You Should Know About From Microsoft Build 2024 [/kc_column_text][kc_spacing height=”20″ _id=”279962″][/kc_column][/kc_row][kc_row _id=”118996″][kc_column width=”12/12″ video_mute=”no”…
Why Even Tiny Businesses Benefit from MSP IT Support
[kc_row _id=”859847″][kc_column width=”12/12″ video_mute=”no” _id=”179898″][kc_column_text _id=”690535″]You’re Never Too Small… In our modern business world, even the smallest enterprises face complex…
Newsletter #1
[kc_row _id=”385689″][kc_column width=”12/12″ video_mute=”no” _id=”19310″][kc_column_text _id=”526827″ css_custom=”{`kc-css`:{`any`:{`typography`:{`color|,p`:`#12143c`}}}}”]Welcome to the first Vissensa Newsletter [/kc_column_text][kc_spacing height=”20″ _id=”744657″][/kc_column][/kc_row][kc_row _id=”609895″][kc_column width=”12/12″ video_mute=”no” _id=”203088″][kc_column_text _id=”884568″…
External IT Support – How MSPs Can Work With IT Managers
[kc_row _id=”103208″][kc_column width=”12/12″ video_mute=”no” _id=”893173″][kc_column_text _id=”514515″]In today’s fast-paced digital landscape, businesses rely heavily on their IT infrastructure to drive operations,…
Email Spoofing – Consequences of a Successful Attack?
[kc_row _id=”553440″][kc_column width=”12/12″ video_mute=”no” _id=”757875″][kc_column_text _id=”764737″]This blog is a supplement to the technical guide Vissensa has written around the use…
Email Spoofing – Configuring Email Security
[kc_row _id=”802682″][kc_column width=”12/12″ video_mute=”no” _id=”534512″][kc_column_text _id=”614160″]In today’s digital landscape, email spoofing is a prevalent technique used by cybercriminals to deceive…
What is Email Spoofing? – Ensuring Secure Email Communication
[kc_row _id=”292617″][kc_column width=”12/12″ video_mute=”no” _id=”214651″][kc_column_text _id=”632336″]Is Email Spoofing Damaging Your Reputation? The landscape for cyber-crime is ever changing and in…
SonicWall Cyber Threat Report
[kc_row _id=”737550″][kc_column width=”12/12″ video_mute=”no” _id=”621074″][kc_column_text _id=”65059″] As part of our partnership with SonicWall, we have been focusing on cyber threats,…