Skip to content
Onca Technologies Ltd

Onca Technologies Ltd

Specialist IT Advice | IT Security | Bespoke System Solutions | Process Optimisation | Enterprise Computing

  • Home
  • Features & Guides
    • Welcome
    • Demystifying GDPR
    • Becoming GDPR Compliant
  • Services & Solutions
    • Office 365
    • Coordination / Project Management
    • Document Management System
    • Apple MDM
    • Client Portal
  • Contact
  • Downloadable Content
  • Checkout
Posted on September 1, 2017November 7, 2018 by admin

Welcome

On this page, Onca Technologies hopes to shine a spotlight on relevant topics, current technology and businesses processes to help readers where we can!

CategoriesAll Posts TagsWelcome

Post navigation

Next PostNext Becoming GDPR Compliant

Features & Guides

  • GDPR
    • Demystifying GDPR
    • Becoming GDPR Compliant
  • Welcome

RSS Cyber Security News

  • Barracuda Urges Replacing — Not Patching — Its Email Security Gateways June 8, 2023
    It's not often that a zero-day vulnerability causes a network security vendor to urge customers to physically remove and decommission an entire line of affected hardware -- as opposed to just applying software updates. But experts say that is exactly what transpired this week with Barracuda Networks, as the company struggled to combat a sprawling […]
  • Service Rents Email Addresses for Account Signups June 6, 2023
    One of the most expensive aspects of any cybercriminal operation is the time and effort it takes to create large numbers of new throwaway email accounts. Now a new service offers to help dramatically cut costs associated with large-scale spam and account creation campaigns, by paying people to sell their email account credentials and letting […]
  • Ask Fitis, the Bear: Real Crooks Sign Their Malware June 1, 2023
    Code-signing certificates are supposed to help authenticate the identity of software publishers, and provide cryptographic assurance that a signed piece of software has not been altered or tampered with. Both of these qualities make stolen or ill-gotten code-signing certificates attractive to cybercriminal groups, who prize their ability to add stealth and longevity to malicious software. […]

RSS Technology News

  • Contact Us
  • Privacy Policy
  • Cookie Policy (UK)

Search within our website

  • Facebook
  • LinkedIn
  • Twitter
  • Privacy Policy
  • Cookie Policy (UK)
Privacy Policy Proudly powered by WordPress
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behaviour or unique IDs on this site. Not consenting or withdrawing consent, may affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}