Our Blog
Sophos. How to secure any device, anywhere
Last year, an astounding 51% of organizations were hit by ransomware, with attackers succeeding in…
4 minutes read
What are Data Security Solutions and How do They Work?
Data is one of the valuable commodities shared by all organizations regardless of size, location,…
8 minutes read
DearCry. What it is and how to stop it
DearCry is a new ransomware variant that exploits the same vulnerabilities in Micosoft Exchange as…
2 minutes read
Sophos. Remote workforce? Offer secure connectivity from any location
There’s no argument that the pandemic has driven a massive increase in remote working. During…
6 minutes read
Protecting Sophos customers from HAFNIUM
Sophos customers are protected from the exploitation of the new zero-day vulnerabilities affecting Microsoft Exchange….
5 minutes read
Acunetix. Vulnerability Scanning Tools – Why Not Open-Source?
With the immense popularity of open-source software such as Linux, WordPress, or Magento, you might…
10 minutes read
Sophos to provide Intercept X for Qualcomm Snapdragon compute platforms
We’re pleased to announce that Sophos will provide Intercept X endpoint protection for 5G PCs…
2 minutes read
Sophos. Try out powerful new XDR and EDR features, now in early access for Intercept X
We are pleased to announce that powerful new Extended Detection and Response (XDR) and Endpoint…
3 minutes read
Boldon James. 10 Tips to Protect Your Company´s Data in 2021
he amount, complexity, and relevance of the data that companies handle has increased exponentially. Today…
11 minutes read
Sophos. Securing the Anywhere Organization
It’s easy to pinpoint when the global health crisis forever changed the security landscape. All…
5 minutes read