Our Blog
Datto. Top Tips for Cybersecurity Regulatory Compliance
Did you know that human mistakes are to blame for 95% of all cybersecurity breaches?…
8 minutes read
Sophos. The importance of zero trust network access (ZTNA) in healthcare
With perimeter boundaries quickly blurring thanks to remote care and telehealth, the implicit trust placed…
3 minutes read
Sophos XGS Architect Training September 2022
Book Your Training Today!Call us now for more +30 211 8000 330 Sophos XGS Architect…
1 minute read
HelpSystems. Enterprise Data Security: Why It Matters and How To Build a Strategy
Before trying to better understand what enterprise data security is, it’s best to know the…
10 minutes read
Datto. Defending Against Data Loss: Choose the Reliable Solution
When a large-scale data loss recently occurred at a backup provider, it shined a new…
8 minutes read
BeyondTrust. One-Time Password (OTP) Solutions for Privileged Access
What are one-time passwords? A one-time password (OTP) is the password used in a credential…
5 minutes read
HelpSystems. Customer Phishing Protection Couldn’t Be Easier with Agari and PhishLabs
It’s not news that cybercrime is a constant battle—large enterprises and small businesses everywhere are…
6 minutes read
Core Impact Introduces Ransomware Simulation
Once upon a time, it was often necessary to define the term “ransomware” as it…
4 minutes read
Core Security by HelpSystems. 4 Steps to Take Following a Pen Test
Congratulations! You’ve just completed a penetration test. So what now? A pen test shouldn’t represent…
6 minutes read
Introducing Sophos Cloud Native Security
Protect all your servers, from on-prem to multi-cloud, Windows to Linux, all fully integrated within…
3 minutes read