Can Your Staff Catch a Phish?

Phishing scams are attempts by cybercriminals to trick users into performing some type of action like clicking on a link, entering credentials, opening an attachment or even making changes to a company’s process. They can result in ransomware, installation of...

How To Lower The Cost Of Backups With Hot Cloud Storage

With Microsoft Office 365, there is a shared responsibility model. It’s your data — you control it — and it is your responsibility to protect it.  So you’ve decided to backup your Office 365 data in the cloud, but there are many clouds to choose from – and not all...

How to Become a Cybersecurity-Savvy Director

Until an incident, cybersecurity isn’t discussed in many boardrooms. The topic is often viewed as a box to be checked while directors devote their attention to the core mission and goals. But the dramatic rise in successful cyberattacks last year highlights the rising...

How Does Your Board Understand Your Cyber Risks?

It’s become impossible to sit at the head of a company and not address the threat of cyber risk. Cyber attacks are increasingly damaging, and boards of directors and the C-suite need ways to evaluate them, even if they can’t grasp the technical details. This has led...

Cloud Migration Essentials

Many organizations now want to quickly take advantage of the benefits of the cloud by migrating their existing applications and workloads. However, cloud migration requires careful planning and strategy. To enable successful migration, it’s important to have a strong...