Category: Interessant

Weaknesses in your cybersecurity posture

Last week, we discussed some new developments in cybersecurity and in cyberattacks, including Storm-0501’s transition to targeting the Cloud. This reveals unaddressed weaknesses in our cybersecurity postures – including gaps left by Shadow IT. What is Shadow IT? Shadow IT are systems your security team doesn’t know about; unmanaged assets...
by Matúš Koronthály

Cloud-based ransomware attacks

Microsoft wrote a blogpost of their own recently discussing shifts in tactics employed by Storm-0501, a notorious ransomware gang – increasingly, a shift towards Cloud-based...
by Matúš Koronthály

Backups – not just for businesses

Archiving and data backups for businesses are the main topic we have circled around on this blog, especially since more and more regulations outright require it – elevating...
by Matúš Koronthály

WinRAR Zero-Day Attack

A zero-day attack on WinRAR was disclosed last week. The vulnerability, tracked as CVE-2025-8088, affects all Windows versions of WinRAR up to 7.12. Users of the ubiquitous...
by Matúš Koronthály

Reviewing data retention and deletion

We’ve written on the topic of data retention and deletion before, but it’s a good idea to revisit the information again. Given the amount of data that businesses collect,...
by Matúš Koronthály

Reviewing E-Discovery

What is eDiscovery, and what effects does it have on your business? These are questions that all companies in the current business environment should have a ready answer to. As...
by Matúš Koronthály

Data on the Cloud – Migration and Management

Cloud adoption continues to climb, showing despite the already staggering numbers and rising challenges that the Cloud is nowhere near market saturation yet. This naturally leads...
by Matúš Koronthály

DORA still presenting challenges

The vast majority of financial services firms across Europe believe themselves to be unable to meet the full business resiliency requirements of the EU’s Digital Operational...
by Matúš Koronthály

Data handling and protection updates

As we go into mid-summer and Q3 2025, it’s time to take another moment to catch up on the updates regarding data handling and protection. Let’s see what the newest information...
by Matúš Koronthály

Protecting backups for cyber resilience

More companies are beginning to understand the need for establishing backups and other systems for managing their data and establishing recovery. At the same time, there’s a...
by Matúš Koronthály

Microsoft finally ends Remote PowerShell protocol

As was signaled long in advance, Microsoft is finally making a move to axe both Remote PowerShell protocol (RPS) and other legacy authentication methods. An alert in the Microsoft...
by Matúš Koronthály

Backups on and off the Cloud

According to Flexera’s 2025 State of the Cloud report, 70% of all businesses employ a hybrid cloud or multicloud strategy, something we have also written about previously....
by Matúš Koronthály

EU Data Act 2025 coming soon

The EU Data Act 2025 is coming soon, slated to be effective from September 2025. Joining an already long list of data regulations, the Data Act promises to further develop the...
by Matúš Koronthály

Cybersecurity’s biggest hurdle

Cybersecurity is a hot-button topic, and continues to pop up in mainstream industry news every time there is a large-scale failure. So why does it continue to see so little...
by Edit Balázsy Csóka

Software flaw opens vulnerability in NHS

A software flaw may have opened a new vulnerability in the NHS. The NHS is now reportedly “looking into” allegations that patient data was left vulnerable due to a...
by Matúš Koronthály

The future of cybersecurity

The industry has to look forward to the future of cybersecurity – including a new generation of specialists, and newly developed tools and procedures. This past Sunday, nearly...
by Matúš Koronthály

Preserving data from Microsoft 365

Microsoft 365 remains by far the most dominant system for enterprises and organizations worldwide. This has had, however, a corresponding effect on how much attention needs to be...
by Matúš Koronthály

AI and Cybersecurity – what to know

AI has been the hot topic for over a year now, with new developments almost monthly. AI and cybersecurity will naturally be two intertwined topics – let’s go over how the...
by Matúš Koronthály

Current trends in Cybersecurity

The new year has revealed interesting new trends in the cybersecurity and data handling space – some positive, some less so. Let’s take a quick look at some of the most...
by Matúš Koronthály

contentACCESS Backup for Microsoft 365 is here!

We at TECH-ARROW are proud to give you access to our newest product – contentACCESS Backup for Microsoft 365 is released now, along with contentACCESS 7.0! Why backup? As...
by Matúš Koronthály