Cybersecurity Blog
- BlogHack the hacker: How LockBit's ransomware empire crumbledIn 2024, law enforcement took down one of the cyber world's most ruthlessly efficient ransomware groups: Lockbit.CyberthreatsData ProtectionData Security
- BlogScattered Spider: How law enforcement turned the tablesRemembering the notorious Scattered Spider cybercrime group, whose social engineering scams caused millions of dollars in damages to some of the world's biggest brands.Cyberthreats
- BlogMaking sense of Microsoft’s partner changes: A guide for MSPsMicrosoft is changing its Direct Bill rules. But there is a way forward.Microsoft
- BlogProtect clients, grow services: Unified endpoint security for MSPsOpenText endpoint security gives MSPs an edge against cyber attackers by providing advanced detection and response through one lightweight agent.CyberthreatsData ProtectionData SecurityPartners
- BlogWhat Is social engineering?When attackers target human behavior to compromise cyber security, the tactic is known as social engineering.Cybersecurity GlossaryCyberthreatsEmail SecurityMDR/EDR
- BlogWindows 10 end of life: Backup strategies for SMBsWith Microsoft ending support for Windows 10, many organizations will need a robust backup strategy to safeguard endpoints, cloud data and legacy hardware.Data ProtectionData SecurityMicrosoft
- BlogWhat SMBs must do before Windows 10 support endsA reliable, cloud-based endpoint backup solution is crucial, to protect data from multiple failure points during the transition.Data recoveryData SecurityMicrosoftSecure Cloud
- BlogWhat is security awareness training?At its core, security awareness training equips employees with the knowledge and skills they need to recognize, avoid, and respond to cybersecurity threats.Cybersecurity GlossaryCyberthreats
- BlogWhat is a botnet?When a network of devices is infected with malware that connects to a central attacker or command system, it's known as a botnet.Cybersecurity GlossaryCyberthreatsEmail Security