present

Nutanix .NEXT 2021 Conference

September 30, 2021

Nutanix kicked off its .NEXT 2021 conference on September 21.fr The virtual event, with the theme "The Cloud on Your Terms", coincides with the..

Why and how to prevent your data from being sold on the Dark Web?

August 26, 2021

Do you think that using a remote desktop (RDP and or VPN) or M365, in these remote working times, is safe, just because you use complex and unique..

Cybersecurity and Compliance in The Pharmaceutical Industry

July 15, 2021

Whether it's for an over-the-counter pain reliever, a cutting-edge cancer drug and now the Covid-19 vaccine, the world's population depends on at..

Why adopt a Zero Trust security model as soon as possible?

June 23, 2021

A model inherited from the past: Trust but verify "Doveryai, No Proveryai" ("Trust but verify") is a Russian proverb, which became the catch phrase..

5 Deadly Myths on SMB Security

June 9, 2021

As a Managed Security Services Provider, we come into contact with SMB executives who are sometimes perplexed or helpless regarding the security..

VeeamON 2021 at a glance

May 27, 2021

Veeam, created a decade ago, has an impressive track record: 1 million active installations of Veeam Backup & Replication (the world's most..

How to recover from a ransomware attack

March 9, 2021

With the increasing sophistication and scale of ransomware attacks, hiding your head in the sand and hoping not to be among the victims is, without..

Managed Services - An Asset during Spring Break

February 23, 2021

Spring break is approaching, and many IT departments find themselves preparing to be short-staffed as employees take time off. Especially this year,..

Happy Holidays and warm wishes for 2021!

December 16, 2020

While this holiday season is unlike any other, the team at Present and Bang would like to wish you a happy holiday season, as well as a wonderful New..

Say goodbye to ransomware and ransom payments

November 19, 2020

The main goal of cybercriminal organizations and independent hackers is to access your data in order to hold it hostage and to steal it. And the..