
Our Blog
Core Security by HelpSystems. 4 Steps to Take Following a Pen Test
Congratulations! You’ve just completed a penetration test. So what now? A pen test shouldn’t represent…
6 minutes read
Introducing Sophos Cloud Native Security
Protect all your servers, from on-prem to multi-cloud, Windows to Linux, all fully integrated within…
3 minutes read
Sophos. What is zero trust and why is ZTNA so important?
Trust is a dangerous word in IT, especially when that trust is granted without much…
2 minutes read
Sophos ZTNA receives Global New Product Innovation Award from Frost & Sullivan
Sophos ZTNA has received Frost & Sullivan’s prestigious Global New Product Innovation Award in the…
2 minutes read
Sophos Firewall OS v19 MR1 is now available
Sophos Firewall OS v19 MR1 brings a number of additional enhancements and fixes to what…
4 minutes read
HelpSystems. Celebrating 10 Years of Cobalt Strike
Can you believe it? Cobalt Strike is 10 years old! Think back to the summer…
2 minutes read
HelpSystems | TLS for Email: What is It and how to check if an email uses it
TLS is a popular Internet security protocol designed to establish secure communications that provides both…
6 minutes read
Sophos Managed Threat Response: 10,000 customers and counting!
Organizations are rapidly switching to Sophos’ managed detection and response service to enjoy better cybersecurity…
4 minutes read
HelpSystems. Modern Data Security for the Enterprise
How companies can layer security solutions to ensure their data is fully protected no matter…
6 minutes read
Datto. How to protect endpoints with a multi-layer security strategy
Malware and ransomware infection rates are increasing year-over-year, with ransomware attacks doubling in 2021 according…
7 minutes read