Skip to Navigation Skip to Posts Skip to Content
80with20 80with20
  • Home
  • Contact
  • - Work
  • Zoho Development
  • Cyber Security Services
  • Other Techy Services
  • Pricing
  • - Play
  • Blog
Socials
  • X/Twitter
  • Facebook
80with20 80with20
80with20 80with20

Get 80% of the result when you've only got 20% to play with.

  • Home
  • Contact
  • - Work
  • Zoho Development
  • Cyber Security Services
  • Other Techy Services
  • Pricing
  • - Play
  • Blog

© 80with20
  • X/Twitter
  • Facebook
Blog
Featured Post AI

Ask not what AI can do for your business - but what your business can do for AI!

Nov 12, 2024 2 min read
Cyber Security

Application Control: Do you feel in charge?

Oct 9, 2024 2 min read
Cyber Security

Regular Backups: Because sometimes, you need a plan B (or C, or D)

Oct 9, 2024 2 min read
Cyber Security

Multi-factor Authentication: Because One Lock on Your Digital Door Isn't Enough

Oct 9, 2024 3 min read
Cyber Security

Restrict Administrative Privileges: The 'Least Privilege' Principle

Oct 9, 2024 3 min read
Cyber Security

User Application Hardening: Small Setting Changes, Big Security Wins

Oct 9, 2024 3 min read
Cyber Security

Configure Microsoft Office Macro Settings - What even is a macro?!?

Oct 9, 2024 3 min read
Cyber Security

Operating System Updates: More than just an annoying reboot

Oct 9, 2024 3 min read
Cyber Security

Why That Annoying Update Notification Might Save Your Business

Oct 9, 2024 4 min read
Cyber Security

The Essential Eight: Maximising Security, Minimising Effort

Oct 9, 2024 2 min read
Load More You've reached the end of the list
  • Home
  • Contact
  • Zoho Development
  • Cyber Security Services
  • Other Techy Services
  • Pricing
  • Blog
  • Home
  • Contact
  • - Work
  • Zoho Development
  • Cyber Security Services
  • Other Techy Services
  • Pricing
  • - Play
  • Blog
Socials
  • X/Twitter
  • Facebook
Featured Post AI

Ask not what AI can do for your business - but what your business can do for AI!

Nov 12, 2024 2 min read
Cyber Security

Application Control: Do you feel in charge?

Oct 9, 2024 2 min read
Cyber Security

Regular Backups: Because sometimes, you need a plan B (or C, or D)

Oct 9, 2024 2 min read
Cyber Security

Multi-factor Authentication: Because One Lock on Your Digital Door Isn't Enough

Oct 9, 2024 3 min read
Cyber Security

Restrict Administrative Privileges: The 'Least Privilege' Principle

Oct 9, 2024 3 min read
Cyber Security

User Application Hardening: Small Setting Changes, Big Security Wins

Oct 9, 2024 3 min read
Cyber Security

Configure Microsoft Office Macro Settings - What even is a macro?!?

Oct 9, 2024 3 min read
Cyber Security

Operating System Updates: More than just an annoying reboot

Oct 9, 2024 3 min read
Cyber Security

Why That Annoying Update Notification Might Save Your Business

Oct 9, 2024 4 min read
Cyber Security

The Essential Eight: Maximising Security, Minimising Effort

Oct 9, 2024 2 min read
Load More You've reached the end of the list