Present Blog – IT Thought Leadership

Summer: it's time for holidays and cyberattacks!

June 2, 2022

As DJ Jazzy Jeff & the Fresh Prince said:"Summer, summer, summertime. Time to sit back and unwind." Unfortunately summer holidays are..

Crossware signature management solution : Make your marketing team happy with consistent, beautiful email signatures

May 19, 2022

Your business sends hundreds or even thousands of emails every day, so it's important to ensure that each email contains your corporate branding,..

Why it's so important to backup your M365 environment

May 5, 2022

Would you be surprised to hear that your emails are not backed up by Microsoft? To be more precise, Microsoft backs up your Office 365 environment,..

Microsoft Teams Phone - What you need to know

April 20, 2022

Microsoft Teams Phone combines the best of VoIP and video conferencing.
More and more users will have become familiar with Microsoft Teams over the..

Datto SIRIS: The All-In-One Managed Continuity Solution, with Native Immutability

March 24, 2022

For adversaries, it is no longer just a matter of encrypting backups and production data. It's also about stealing your data in order to sell it,..

Cybersecurity Culture: Allow your employees to be part of the solution, not the problem!

March 10, 2022

If you're familiar with our blog, you already know: the number of cyber threats to businesses is increasing every year. Today, cybersecurity is an..

Multi-Factor Authentication: understand the risks, focus on quick wins, and act as soon as possible

February 17, 2022

Groundhog day "Hackers Don’t Break In, They Log In." Day after day, adversaries connect to their victims' services and applications using means such..

Why a SOC-as-a-Service is essential for SMBs?

February 3, 2022

Ransomware has become the top security concern for all organizations, regardless of size.This is because adversaries have a wide range of methods at..

Bill 64: the hare, the tortoise and the ostrich.

January 20, 2022

Companies have until September 22, 2023 to comply with the provisions of Bill 64. Failure to do so could expose themselves to criminal penalties of..

How to recover from a Log4j attack?

December 20, 2021

Many articles explain how to fix the Log4j flaw and mention the saga of security updates provided by Apache. When an adversary is able to exploit..