Featured

Recent Post

Employing Mitigation Solutions to Prevent DDoS Attacks

| Blog | No Comments

Distributed denial-of-service (DDoS) mitigation remains a top priority for enterprises, as attackers are leveraging both cloud services and Internet of Things devices to deliver DDoS attacks. CSO notes that the most recent…

How to Choose an Effective IT Outsourcing Partner

| Blog | No Comments

The first wave of cost-cutting outsourcing has come to an end. Gone are the days when tasks could be shipped to another location to be done at a much lower…

eSmart Digital Licence launch – The Alannah and Madeline Foundation | Google | CoreMind

| Blog | No Comments

The Alannah and Madeline Foundation and Google Australia launched the eSmart Digital Licence today at The King’s School, Sydney. CoreMind spearheaded the development of this exciting initiative for primary school kids. With…

Data Security – Thinking Beyond The Perimeter

| Blog, Data Security | No Comments

Data security is top of mind at the moment. Based on my recent client experiences, most SMEs are focused on the “security perimeter” and keeping people outside the network. But…

Load More

Popular Post

Disaster Recovery Management and Testing Being Simplified by The Cloud

| Blog | No Comments

In the event that your enterprise is putting off a disaster recovery (DR) test since it devours time and assets, consider what may happen if catastrophe strikes: You could for…

Enterprise Software, Digital Transformation Drive Global IT Investments

| Blog | No Comments

Gartner is predicting a 2.4 percent growth in global IT spending in 2017 following an anaemic 0.3 percent growth rate in 2016. Investments in enterprise software and digital transformation in…

Ensure Successful Network Management by Defining Metrics

| Blog | No Comments
A network management service should help organizations achieve their broader business goals, not hinder them. CIOs must be sure to incorporate network-oriented metrics when evaluating if the service is delivering...

Employing Mitigation Solutions to Prevent DDoS Attacks

| Blog | No Comments

Distributed denial-of-service (DDoS) mitigation remains a top priority for enterprises, as attackers are leveraging both cloud services and Internet of Things devices to deliver DDoS attacks. CSO notes that the most recent…

How to Choose an Effective IT Outsourcing Partner

| Blog | No Comments

The first wave of cost-cutting outsourcing has come to an end. Gone are the days when tasks could be shipped to another location to be done at a much lower…

eSmart Digital Licence launch – The Alannah and Madeline Foundation | Google | CoreMind

| Blog | No Comments

The Alannah and Madeline Foundation and Google Australia launched the eSmart Digital Licence today at The King’s School, Sydney. CoreMind spearheaded the development of this exciting initiative for primary school kids. With…

Data Security – Thinking Beyond The Perimeter

| Blog, Data Security | No Comments

Data security is top of mind at the moment. Based on my recent client experiences, most SMEs are focused on the “security perimeter” and keeping people outside the network. But…

3D Printing Is Ready For You

| Blog, Innovation | No Comments

We’ve had our eye on 3D printing technology for a while. Apart from being blow-you-away cool, it’s the kind of tech that is a game-changer for any company working in…

CoreMind Expert Advice

Webinars

Automate Your Way To $10M
By David Kellam

How To Protect Your Business from Cyber Attacks
By David Kellam

Facebook

Twitter