Present Blog – IT Thought Leadership

Bill 64: the hare, the tortoise and the ostrich.

January 20, 2022

Companies have until September 22, 2023 to comply with the provisions of Bill 64. Failure to do so could expose themselves to criminal penalties..

Goodbye 2021 - A retrospective of the past year

January 6, 2022

As we embark on a new year, it can be said that this past year has once again been an eventful one.  At the time of writing this article many..

How to recover from a Log4j attack?

December 20, 2021

Many articles explain how to fix the Log4j flaw and mention the saga of security updates provided by Apache. When an adversary is able to exploit..

Happy Holidays and warm wishes for 2022!

December 16, 2021

The whole team at Present would like to wish you a happy holiday season, as well as a wonderful New Year! Take advantage of this time to..

Don’t wait to protect your business from cyberattacks … learn from others

December 8, 2021

IT Security is a risk to manage, yet we still see many companies incorrectly assessing the risks. They don’t believe their company could be a..

Interview with a Microsoft expert

November 18, 2021

It’s probably safe to assume that your business is already using Microsoft 365 to some extent to support your connected workforce.  There are,..

The security of your business starts with an audit

November 4, 2021

We all know that security is a top priority for businesses. In fact, we see in AXA’s latest Future Risk Report 2021, that cybersecurity risks rank..

Cyber Security First - Cyber Security Awareness Month 2021

October 20, 2021

It is less expensive, easier and less risky to protect yourself from a ransomware attack than it is to face the consequences of insufficient..

Nutanix .NEXT 2021 Conference

September 30, 2021

Nutanix kicked off its .NEXT 2021 conference on September 21.fr The virtual event, with the theme "The Cloud on Your Terms", coincides with the..

Why it's time to break up with your antivirus and adopt an MDR service

September 23, 2021

Every day thousands of endpoints are compromised by cybercriminals, whether they are beginners or professionals. These cybercriminals use..