Blog

KPCS is a finalist in the Microsoft Awards 2019
 
 Martina Koutníková

On 24 June 2020, the results of the Microsoft Awards 2019 competition were announced. This year's main theme was Digital Transformation, as a process representing a completely new way of connecting people, processes, and data. We are proud to announce that KPCS CZ received the award of a Finalist in...  Continue reading...

Are marketing colleagues wondering how to surely get your business on the front pages of newspapers? We have a guaranteed tip for you, how you can help from the ICT department. Get infected with ransomware and don't try to keep it a secret. Ransomware. A reliable way to the front page. You would...  Continue reading...

I use Microsoft Teams for work daily. During the time I have been using Teams, I have come across many interesting features and tips on how Teams makes my work easier. I'll try to share my tips, I'm sure you use some of them, but I hope you'll come across something you haven't known before. Mentio...  Continue reading...

The concept of zero trust has been here for a long time. Is it possible to trust it? When, according to it, nothing can be trusted? Yes. Because we can verify it with practice. Imagine a situation. All users, applications, end devices, and data are somewhere on the Internet. Users do not sit at t...  Continue reading...

Support of Windows 7 terminated this year on 14 January after more than 10 years. Therefore, technical support and software updates from Windows Update are no longer available for this product to help protect your computer. Windows 7 is despite its age (released in 2009) still popular and was not pu...  Continue reading...

ExRCA in a new guise The announcement of the transition to Microsoft Fluent UI at the Microsoft Ignice conference last year is bearing fruit. In April, a new interface was added to the web tools of the Remote Connection Analyzer (RCA). These tools allow you to verify functionality from the ind...  Continue reading...

Remote cooperation and applications related thereto are becoming more and more searched for, not only by users but also by attackers trying to find new bugs and vulnerabilities in these products. Unfortunately, Microsoft Teams was no exception, and together with Zoom and others faced vulnerabilities...  Continue reading...