
Information Technology News you may have missed in September 2020
Our monthly selection of information technology news continues, bringing you the most important news, developments and trends with insightful analysis from the industry. Webex Improves Secure Distance Learning Options Cisco’s Webex Classrooms’
The steps we take in VOIP deployment
When choosing the right phone system for your business, user adoption and change management must be as much of a consideration as innovation and functionality. In this article, we will
Information Technology News you may have missed in May 2020
Going forward, we will be having a Xenex IT News section on our blog where we will centralise what’s new in the Information Technology market. Follow our blog to stay
Let’s look into some of the benefits of managed IT services for businesses in Perth
Managed services allow IT companies to discover and assess technical issues before they have the potential to take a negative effect on businesses. Due to the proactive nature of these
What are the popular managed IT services pricing models?
If you’re a business owner seeking managed IT services in Perth and wondering what different pricing models and average costs there are, this article will outline what you need to
Managed IT Services vs. Traditional IT Support: which is better for your business?
Businesses of all sizes prioritise operational efficiency, however, not all organisations are equally equipped to maintain this efficiency. Small businesses sometimes have limited IT resources, allowing them to quickly fall
Colocation with IP Transit for your business
IP Transit offers unique advantages to businesses who host their IT infrastructure with their colocation provider. By providing direct access to peers and internal IT infrastructure, IP transit offers speed,
How we use Multi-Factor Authentication
Multi-factor authentication is a must-have in the technology world, especially in the situation where remote working is required. Implemented correctly makes it significantly more difficult for an enemy to steal
Why and when do we use Multi-Factor Authentication?
This article provides guidance on what multi-factor authentication is and why it’s so important, how the factors came up, the different multi-factor authentication methods that exist and why some methods