Reset Filters ⤫
#MicrosoftFirst Breach Detection Charities Cloud App Security Collaboration COVID Cyber Security Cyber Security Roundups disaster recovery Email Security Events Finance Hybrid working Internet Security malware Microsoft 365 Microsoft Defender Phishing Productivity Ransomware risk posture security awareness training SIEM social engineering Uncategorised Universities Working from home
Your guide to Microsoft Defender External Attack Surface Management (EASM)
Microsoft released Defender External Attack Surface Management (EASM) a few months ago based on the EASM…
Read More

Five key changes to the Cyber Essentials scheme in 2022
As the way we work continues to evolve, it’s important for your organisation to demonstrate that…
Read More

What you need to know from the Microsoft Digital Defense Report 2021
“2021 brought powerful reminders that to protect the future we must understand the threats of the…
Read More

Seven steps to ransomware resilience with a Microsoft First approach
New and more dangerous strains of ransomware are emerging all the time. Ransomware is becoming more…
Read More

Five steps to protect against ransomware with Microsoft 365
Ransomware is the fastest growing type of malware, with the value of ransomware payouts increasing over…
Read More

Adriaan Bekker’s top five data migration myths and recommendations
We all operate within the information age, where data has become one of the world’s most…
Read More

Why Microsoft is a leader of four Gartner Magic Quadrants for Information Security
Microsoft continues to strengthen its position as a front runner in information security and has been…
Read More

Top three takeaways of 2020
As 2020 draws to a close, here are the top three takeaways that can help your…
Read More

Ransomware and crypto-locker on the rise
Ransomware and crypto locker threats are on the increase. In fact, ransomware attacks have almost doubled…
Read More