Datto. Top Tips for Cybersecurity Regulatory Compliance

Did you know that human mistakes are to blame for 95% of all cybersecurity breaches?…

Published September 13, 2022
8 minutes read

Sophos. The importance of zero trust network access (ZTNA) in healthcare

With perimeter boundaries quickly blurring thanks to remote care and telehealth, the implicit trust placed…

Published September 8, 2022
3 minutes read

Sophos XGS Architect Training September 2022

Book Your Training Today!Call us now for more +30 211 8000 330 Sophos XGS Architect…

Published September 5, 2022
1 minute read

HelpSystems. Enterprise Data Security: Why It Matters and How To Build a Strategy

Before trying to better understand what enterprise data security is, it’s best to know the…

Published September 5, 2022
10 minutes read

Datto. Defending Against Data Loss: Choose the Reliable Solution

When a large-scale data loss recently occurred at a backup provider, it shined a new…

Published September 1, 2022
8 minutes read

BeyondTrust. One-Time Password (OTP) Solutions for Privileged Access

What are one-time passwords? A one-time password (OTP) is the password used in a credential…

Published August 26, 2022
5 minutes read

HelpSystems. Customer Phishing Protection Couldn’t Be Easier with Agari and PhishLabs

It’s not news that cybercrime is a constant battle—large enterprises and small businesses everywhere are…

Published August 23, 2022
6 minutes read

Core Impact Introduces Ransomware Simulation

Once upon a time, it was often necessary to define the term “ransomware” as it…

Published August 19, 2022
4 minutes read

Core Security by HelpSystems. 4 Steps to Take Following a Pen Test

Congratulations! You’ve just completed a penetration test. So what now? A pen test shouldn’t represent…

Published August 16, 2022
6 minutes read

Introducing Sophos Cloud Native Security

Protect all your servers, from on-prem to multi-cloud, Windows to Linux, all fully integrated within…

Published August 11, 2022
3 minutes read