Blog

How cybercriminals take over your email account

Researchers from Barracuda and UC Berkeley, conducting a large-scale analysis of email account takeover and the timeline of attacks, recently highlighted the behaviors hackers are using to try to avoid detection, ways to identify suspicious activity that could indicate an email account has been compromised, and precautions you can take to protect...
by Lucia Barancikova

Uncovering the long term cloud archive equation

Deciding, for the long run, where to keep an organization’s media-centric assets (i.e., original content, EDLs, finished masters, copies, versions, releases, etc.,) is reshaping...
by Lucia Barancikova

Hackers go phishing for the holidays

It’s that time of year again. Everyone’s busy – at work and at home. That includes cybercriminals, too. In fact, the holiday season is when busy, distracted people tend to...
by Lucia Barancikova

Protection of data in a SaaS environment

SaaS is soaring as organisations of all types and sizes adopt the software-as-a-service model for their application needs. Just look at the numbers: Recent research from Okta...
by Lucia Barancikova

Top 5 Cybersecurity and Cybercrime Predictions for 2020

We distilled 30 independent reports dedicated to cybersecurity and cybercrime predictions for 2020 and compiled the top 5 most interesting findings and projections in this post....
by Lucia Barancikova

The Evolution of Disaster Recovery

As the turn of the year rears its head once again, it’s time to look at what’s set to change in the business continuity and disaster recovery (BCDR) industry over the...
by Lucia Barancikova

Migrating Saperion to O365?

Do you have emails and documents stored in Saperion DMS or ELM? Are you using shortcutting features, replacing the original emails in the users’ mailboxes with so called...
by Lucia Barancikova

What is the Cost of Cybercrimes & Attacks

The word cybercrime is no longer just a word you hear coming from Fortune 500 CEOs anymore. This word has being flashed on every good morning news show and radio channel....
by Lucia Barancikova

7 Crucial Components of Cyber Incident Recovery

Organizations of all sizes are consistently reporting increased numbers of cyber incidents, with data breaches and ransomware infections fast becoming a common occurrence. While...
by Lucia Barancikova