Blog
Discover what’s new
Our latest thought pieces
Microsoft Exchange’s Zero-Day Exploits Could Have Been Prevented
It’s the worst email attack of the year, perhaps even in history. And the worst part about it is, things didn’t have to get this bad.
Why It’s Crucial to Balance Security and Convenience
Cybersecurity is critical, especially in an age where everyone works from home. But you also can’t sacrifice ease of use. Here’s how to strike a balance between the two.
3 Critical Steps for Healing Your Reputation After a Data Breach
In spite of how common they are, cybersecurity incidents like data breaches can be extremely damaging to your reputation. Here’s how to manage the fallout.
Why the Separation of Work and Personal Data Is Imperative in Enterprise
With more people working from home than ever, businesses now face a unique challenge: the separation of professional and personal data. Here’s why this is something your business cannot afford to ignore.
Someone Tried To Poison A City’s Water Supply. It Could Happen Again.
Earlier this month, a hacker broke into the water system of Oldsmar, Florida in an effort to poison the water supply. This time, the hack was discovered before it caused serious harm. Next time, it might not be.
3 Critical Steps To Keeping the Internet of Things Secure in the Workplace
The Internet of Things is playing an increasingly prominent role in the enterprise space. Unfortunately, that goes hand in hand with a ton of security issues. Here’s how you can address them.
5 Things To Do Immediately After Discovering a Data Breach
The hours after uncovering a data breach are critical, and require immediate action. Here’s what you should do.
5 Signs It’s High Time To Update Your Business’s Infrastructure
Your infrastructure is a critical component of your business. And if that infrastructure is outdated, it opens you up to a world of trouble. But how can you tell it’s time to upgrade?
What the Solarwinds Hack Teaches Us About Cybersecurity
It’s been called one of the worst cyberattacks of the year, perhaps even the decade, and with good reason. Through IT management firm Solarwinds, hackers compromised some of the top public and private sector businesses in North America. Here’s how it happened.
Recent Posts
- Backup-as-a-Service vs. Disaster-Recovery-as-a-Service: A brief comparison
- Scalability and flexibility: A guide to hybrid cloud solutions
- The evolving landscape of disaster recovery: When and how to refresh your strategy in 2024
- Prepare for the Worst: The Most Common IT Disasters
- 6 Most Common DaaS Mistakes to Avoid