Posts about

IT security (6)

Why adopt a Zero Trust security model as soon as possible?

June 23, 2021

A model inherited from the past: Trust but verify "Doveryai, No Proveryai" ("Trust but verify") is a Russian proverb, which became the catch phrase..

5 Deadly Myths on SMB Security

June 9, 2021

As a Managed Security Services Provider, we come into contact with SMB executives who are sometimes perplexed or helpless regarding the security..

VeeamON 2021 at a glance

May 27, 2021

Veeam, created a decade ago, has an impressive track record: 1 million active installations of Veeam Backup & Replication (the world's most..

Present just saved another client from a cyberattack

March 23, 2021

Protect yourself now, thank us later Remote working for most businesses has been set up for more than a year now, pleasing many cybercriminals. In..

How to recover from a ransomware attack

March 9, 2021

With the increasing sophistication and scale of ransomware attacks, hiding your head in the sand and hoping not to be among the victims is, without..

Managed Services - An Asset during Spring Break

February 23, 2021

Spring break is approaching, and many IT departments find themselves preparing to be short-staffed as employees take time off. Especially this year,..

Backups are essential to defend against cybercrime

February 4, 2021

With all the recent talk about cybersecurity and how the pandemic has affected the capacity of businesses to protect themselves against attacks, one..

Top 3 technology trends businesses need to know about for 2021

January 14, 2021

As we embark on 2021 , it's time to focus on what's next in terms of trends and technological advancements. The Covid-19 pandemic shook up the..

The day we were hit by ransomware

December 3, 2020

Just prior to the hostage taking The holidays were fast approaching. Alex, who had mainly worked from home since the start of the pandemic, decided..

Say goodbye to ransomware and ransom payments

November 19, 2020

The main goal of cybercriminal organizations and independent hackers is to access your data in order to hold it hostage and to steal it. And the..