Blog

Cyberattack on MeridianLink

Ransomware has reached a new height. In addition to existing methods of coercion, hostile actors have begun exploiting government rulings to put additional pressure on targeted entities. According to databreaches.net, ALPHV/BlackCat ransomware operation has taken extortion to a new level by filing a U.S. Securities and Exchange Commission...
by Matúš Koronthály

I deleted my email – how do I find it?

The scenario is a common one for any organization that communicates internally and externally through email. You vaguely remember having received an invoice or other critical data...
by Matúš Koronthály

Ransomware has locked my server! What now?

What do you do if ransomware locks your server? While prevention is the first step, organizations have to keep in mind that at some point preventative measures may fail. As such,...
by Matúš Koronthály

You’re in an eDiscovery case – what now?

The situation is not an uncommon one. Worldwide, eDiscovery standards are being adopted as legislation. There’s a common requirement across the USA and EU that organizations...
by Matúš Koronthály

Archive or backup: Do you need both?

Data backup is generally for short-term storage and recovery, while archives are for long-term storage and regulatory retention. Backups and archives are sometimes confused with...
by Matúš Koronthály

Microsoft to decouple Teams from Office in the EU

In response to an EU Commission anti-trust probe, Microsoft has announced plans to decouple Teams from Office in the near future. Microsoft will also make it easier for other...
by Matúš Koronthály

Cyberattack on CloudNordic

Last week saw a significant cyberattack on CloudNordic, a Denmark-based cloud service provider. The company has since issued a public statement confirming the unfortunate incident...
by Matúš Koronthály

Does Microsoft 365 Archive actually meet your needs?

Microsoft is gradually releasing more information about their upcoming Microsoft 365 Archive, including a demo video showing the first functions and details regarding use. These...
by Matúš Koronthály

Introducing Storage Optimizer for Microsoft 365

TECH-ARROW continues to push the boundaries in terms of both archiving and backup solutions as well as storage generally. To that end, we would like to introduce you to the last...
by Matúš Koronthály

WormGPT – a new unwelcome precedent

We’ve covered the various voices calling out AI tools as having a potential for misuse extensively. Now, this misuse can be said to have regularized with the creation of...
by Matúš Koronthály

I have a backup for my systems – now what?

For many organizations, the necessity of establishing an archive and backup for their critical systems has become self-evident. The rise of cyberattacks targeting larger...
by Matúš Koronthály

Cyberattack on Aon

Late this weekend, a cyberattack on insurance giant Aon was reported and confirmed by Dublin Airport Authorities, which were impacted by the breach. Reportedly, the attack...
by Matúš Koronthály

Why should you consider leaving Enterprise Vault?

Enterprise Vault is an established archive solution, having been present on the market under this name since Symantec sold the line off almost a decade ago. At that point,...
by Matúš Koronthály