Blog

Why Microsoft 365 users are not relying on Default Email Protection alone

We have been informing you tirelessly about protecting your data these months, as articles and cases are rising in light speed, where email servers and corporate data become the target of new attackers. It was only a matter of time for many companies before they became the victim of the attack. Even among our clients, […]
by Lucia Barancikova | 4 min read

How cybercriminals take over your email account

Researchers from Barracuda and UC Berkeley, conducting a large-scale analysis of email account takeover and the timeline of attacks, recently highlighted the behaviors hackers are...
by Lucia Barancikova

Uncovering the long term cloud archive equation

Deciding, for the long run, where to keep an organization’s media-centric assets (i.e., original content, EDLs, finished masters, copies, versions, releases, etc.,) is reshaping...
by Lucia Barancikova

Hackers go phishing for the holidays

It’s that time of year again. Everyone’s busy – at work and at home. That includes cybercriminals, too. In fact, the holiday season is when busy, distracted people tend to...
by Lucia Barancikova

Protection of data in a SaaS environment

SaaS is soaring as organisations of all types and sizes adopt the software-as-a-service model for their application needs. Just look at the numbers: Recent research from Okta...
by Lucia Barancikova

Top 5 Cybersecurity and Cybercrime Predictions for 2020

We distilled 30 independent reports dedicated to cybersecurity and cybercrime predictions for 2020 and compiled the top 5 most interesting findings and projections in this post....
by Lucia Barancikova

The Evolution of Disaster Recovery

As the turn of the year rears its head once again, it’s time to look at what’s set to change in the business continuity and disaster recovery (BCDR) industry over the...
by Lucia Barancikova

Migrating Saperion to O365?

Do you have emails and documents stored in Saperion DMS or ELM? Are you using shortcutting features, replacing the original emails in the users’ mailboxes with so called...
by Lucia Barancikova