Blog

Zero-day attacks on Chrome

Microsoft warns that there is an ongoing zero-day attack on Chromium systems, including Chrome and Edge. Users are recommended to take extra care and update as soon as possible. Forbes writes that the North Korean hacking group called Citrine Sleet is behind the Chrome hack. The attack is mainly focused on cryptocurrency holders, but as […]
by Matúš Koronthály

Cybersecurity Update Q3 2024

Given major developments as we near the third quarter of 2024, it’s high time for a cybersecurity update. Among other news, National Public Data (NPD) announced that there...
by Matúš Koronthály

Coming Soon – contentACCESS Backup for Microsoft 365

We at TECH-ARROW are glad to give you this insight into our newest upcoming system – contentACCESS Backup for Microsoft 365. Why backup? As explained thoroughly in this article...
by Matúš Koronthály

Coming Soon – Storage Optimizer PRO

TECH-ARROW is proud to present the new and improved iteration of our unique Storage Optimizer product – Storage Optimizer PRO! Announced shortly after the release of Storage...
by Matúš Koronthály

Cloud spending tops other investments

Cloud file storage provider Nasuni commissioned a survey into technology trends earlier this year, focusing on the USA, the UK and DACH region. Based on this data, Cloud spending...
by Matúš Koronthály

Increased risks during CrowdStrike recovery

The fallout from the CrowdStrike outage continues. While major players are largely up and running again, there are still affected systems out there working on a full recovery....
by Matúš Koronthály

Consequences of CrowdStrike

Last weekend saw one of the largest collapses of online infrastructure since McAfee’s 2010 Windows XP bug, due to an update-induced failure on systems running CrowdStrike. As...
by Matúš Koronthály

What data regulations should I follow?

With the world becoming more heavily regulated and the list of regulations becoming more complex, setting up a data management system, data protections, backups and archives is...
by Matúš Koronthály

Largest data breach to date

In an unprecedented event, almost ten billion unique passwords have been leaked online. The compilation, named RockYou2024, is being referred to as “the largest data breach to...
by Matúš Koronthály

Cybersecurity concerns for small businesses

Cybersecurity, data protection and data handling are recurring topics that affect all organizations in today’s online environment. Despite this, cybersecurity concerns for small...
by Matúš Koronthály

Ban on Kaspersky leads to major cybersecurity shakeup

Late last week, the US government has sent major shockwaves by instituting a ban on products by Kaspersky – a major Russian-based player on the cybersecurity market. The US...
by Matúš Koronthály

Migration to and from the Cloud

With Microsoft having updated their pricing for Azure, it’s high time to look at the question of migration to and from the Cloud again. The Cloud continues to grow Worldwide...
by Matúš Koronthály

Storage Optimizer – Your key to savings

Introduced late last year, Storage Optimizer for Microsoft 365 continues to be the only freely available tool for analyzing your data usage and giving clear, actionable advice...
by Matúš Koronthály

Cybersecurity in the Cloud

The adoption of the Cloud continues to grow. Gartner has found that 94% of organizations agree that public cloud is a crucial part of their digital business initiatives. While...
by Matúš Koronthály

Lapses in healthcare cybersecurity require attention

Over the past year, two things have become increasingly clear. One is that cybercriminals are increasingly targeting the healthcare sector. The other is that lapses in healthcare...
by Matúš Koronthály

I’m on the Cloud – why do I need backups?

The question of “why do I need backups or an archive when I’m on the Cloud” gets asked fairly frequently. After all, the Cloud provider generally keeps a backup of your data...
by Matúš Koronthály

Designing your archiving strategy

Planning for success Archiving data in the modern day is one of the cornerstones of keeping an organization’s continuity intact; it ensures that information remains accessible...
by Matúš Koronthály

USA pushes international cybersecurity measures

The Biden administration is set to unveil a new set of international cybersecurity measures, building on top of their existing cybersecurity focus. This comes against the...
by Matúš Koronthály

Microsoft’s new focus on cybersecurity

After the financial success of Microsoft in the past fiscal year, Satya Nadella has announced Microsoft is shifting focus to cybersecurity. This announcement follows last year’s...
by Matúš Koronthály

Outdated software – a gap in security

While the world continues to focus down on improving cybersecurity in the face of increasing threats, outdated software is rapidly becoming one of the least addressed gaps in...
by Matúš Koronthály