Endpoint Central | January 24, 2023Look twice before you "LookBack" What makes great art, whether it be in literature, painting, film, or photography, so...
General | October 7, 2022Five worthy reads: Who let the stranger in? Video conferencing attacks Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
M365 Manager Plus | September 1, 2022Top five security recommendations for Microsoft 365 When the pandemic hit, organizations around the world shifted their infrastructure to...
M365 Manager Plus | April 12, 2022Protecting your Microsoft 365 services against NOBELIUM attacks [E-book] In December 2020, Microsoft came forward with details regarding what is now being...
General | April 11, 2022Five worthy reads: Cybercrime and its impact on the economy Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
General | December 17, 2021Five worthy reads: Congratulations! You have just been socially engineered Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
AD360 | December 14, 2021The human element in cybersecurity According to IBM's Cost of a Data Breach Report 2021, the global average cost of a data...
General | August 6, 2021Five worthy reads: The never-ending love story between cyberattacks and healthcare Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
Device Control Plus | June 9, 2021Leverage Device Control Plus to secure Mac endpoints and prevent data breaches via peripheral devices With more than 1.4 billion devices in use, Apple has become a household name in technology...
General | March 31, 2021Five worthy reads: The unexpected costs following a cyberattack Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
General | January 22, 2021Five worthy reads: Supply chain cyberwarfare Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
IT Security | November 17, 20205 user behavioral patterns to look out for in a decentralized workspace Problem: If there are thousands of employees scattered around hundreds of places, how do...