PRODUCTS

June 2022

MailStore V22.2: Supporting Windows 11 and Windows Server 2022

MailStore announced the new version 22.1. New MailStore V22.1 brings optimized usability, security and compliance. Almost six weeks later, MailStore announced V22.1.1 for error-free archiving with public folders on Microsoft 365 and recently, the company announced the release of V22.2 offering support for the operating systems Windows 11 and Windows Server 2022 (Essentials, Standard και […]

MailStore V22.2: Supporting Windows 11 and Windows Server 2022 Read More »

Sophos. The State of Ransomware in Healthcare 2022

Get the latest insights into ransomware attacks, ransom payments, and the fast-changing cyber insurance healthcare market over the last year. Sophos has just launched the State of Ransomware in Healthcare 2022, an insightful report carved out of its annual study of the real-world ransomware experiences of healthcare IT professionals. This year, 5,600 IT professionals, including

Sophos. The State of Ransomware in Healthcare 2022 Read More »

Sophos Named Cybersecurity Company of the Year by Cyber Defense Magazine

We’re proud to have been named Cybersecurity Company of the Year by Cyber Defense Magazine. It is an Editor’s Choice winner in the publication’s 10th annual Global InfoSec Awards. “Cybercriminals are constantly changing their tactics, techniques and procedures to evade detection, and Sophos forensic evidence shows a 36% increase in attacker dwell time in 2021. The fact that attackers

Sophos Named Cybersecurity Company of the Year by Cyber Defense Magazine Read More »

HelpSystems. Top 6 Data Security Risks that Can Impact Your Bottom Line

For your organization and others alike, its bottom-line growth is understandably priority number one. But as you’re likely well aware, the growing cyber threat landscape means more risks to organizations’ bottom lines are emerging every day. And while creating a sound cybersecurity strategy can seem overwhelming to teams low on resources, time, or talent, bad

HelpSystems. Top 6 Data Security Risks that Can Impact Your Bottom Line Read More »

BeyondTrust. Why Identity & Access Security is Pivotal to Digital Transformation Success

Organizations everywhere are rapidly shifting their technology stacks to include cloud services, remote work, IoT, and much more. This “digital transformation” is well underway in 2022, and it will only continue to grow. In this blog, we’ll look at the impact digital transformation is having on cybersecurity practices and controls, and the benefits identity and

BeyondTrust. Why Identity & Access Security is Pivotal to Digital Transformation Success Read More »

HelpSystems. Building cybersecurity resilience in financial services

The financial services cybersecurity environment is extremely complex, with a dizzying number of often-overlapping regulations, ongoing threats, and understaffed teams trying to manage it all. Despite paying significant attention to security, many organizations continue to be the targets of advanced persistent threats, fraud, sophisticated phishing campaigns, and other bold efforts to access the personally identifiable

HelpSystems. Building cybersecurity resilience in financial services Read More »

BeyondTrust. 5 Use Cases for Reducing Unix & Linux Attack Surfaces and Achieving Compliance

The concept of least privilege roughly states that all users, applications, and processes should only be granted access to the minimum data and resources they need to perform their job, and for the least time necessary. In many cases, this equates to standard user access. However, many basic OS, management, application, and software functions (e.g.

BeyondTrust. 5 Use Cases for Reducing Unix & Linux Attack Surfaces and Achieving Compliance Read More »