fbpx

Ransomware

JuiceIT Guest Blog | Veeam Platform: Reliable and Fast Recovery from Ransomware in a Hybrid World.

Ransomware attacks have become a growing concern for organisations of all sizes in Australia and New Zealand, resulting in significant…

Protecting Data in a Cloud World: What You Need to Know About Azure Backup

Welcome to part 1 of our 3-part blog series, exploring data protection options and considerations for when you’re operating in…

What you need to know about protecting your Microsoft 365 data

Nearly one-third of all business-critical data resides in SaaS applications today. One of the most widely used…

Tip Sheet Image Card
Top 3 myths about cloud and SaaS data backup

It’s a common misconception that cloud and SaaS data doesn’t need to have a backup. However, just because data…

Q&A St Vincents Health
A new Era in Data Management:
Q&A with Cohesity and St Vincent’s Health Australia

Legacy data management environments are complex and siloed, leading to unnecessary expense and overheads that today’s IT teams simply don’t…

Blog | Cohesity Use Cases
The modern use cases driving an evolution in data protection and recovery

In our previous post, we looked at what’s driving the increased interest in Cohesity and introduced a few use…

Why Cohesity?
What’s driving the increased interest in Cohesity?

There has been a quiet evolution taking place in an area that often gets overlooked when it comes to technology…

Cybercrime Trends with Interpol

Cybercrime has skyrocketed during COVID-19 and while thankfully, the door is firmly closed on the year that was…

Safeguard your Veeam backups with Pure Storage FlashBlade SafeMode

Written in collaboration with Lawrence Ang and Dilupa Ranatunga of Veeam This is the second part of…

Windows 7 Extended Security Updates

The time has finally arrived! On January 14, Microsoft formally announced the end of support for Windows 7. If you…

Gone Phishin’ – What to do if you suspect an attack

Recently, I have had many conversations with connections in several industries that have encountered a recent run of phishing emails.

Executive Guide | CASB 2.0 the next generation of cloud app security

More and more of our critical data, applications and infrastructure are moving from behind the firewall to the cloud –…

The shift of workloads into the cloud continues at an unprecedented pace as organisations seek innovation and productivity gains. However, as more and more apps and services move to the cloud, corporate data is often exposed in ways and places that you never imagined.
Solving the cloud security conundrum

The shift of workloads into the cloud continues at an unprecedented pace as organisations seek innovation and productivity gains. However,…

An Introduction to Symantec CloudSOC

A New Solution for Cloud App Security Symantec CloudSOC is a next generation cloud access security broker (CASB 2.0) solution…

Clinging to the Windows 7 Ledge: Are You Ready to Make the Leap to Windows 10?

Business is all about balancing risk and opportunity. Nowhere, perhaps, is this clearer than in the IT department, where the…

Azure Security Blog
4 Azure security features you must know about

Hosting on the Microsoft Azure platform is a fast and simple method to deploy and manage web-based applications. Countless…

The Office 365 security features you didn’t know existed

When you use Office 365 every day, it can be easy to forget just how powerful it has become…

Are your critical systems heading for the ICU? Prepare for Windows 7 and Office 2010 end of life.

Imagine being critically ill in the back of an ambulance, when just minutes from your nearest hospital you’re suddenly diverted…

Don’t just discover the cloud, control it!
Don’t just discover the cloud, control it!

End-users move constantly between devices and locations to access data when and where they need it for uninterrupted productivity. There…

A new model for safe and secure Windows patch management

I’ve seen a lot of evolution in desktop operating systems (OS), both in the product itself, and how it has…

Cyberattacked Disaster Recovery
Facing the threat of cyberattacks: how does your disaster recovery solution stack up?

It’s a message every IT manager dreads. ‘Your personal files are encrypted by CTB-Locker. To decrypt the files, you need…

Cisco Ransomware Defence for Dummies
Cisco Ransomware Defence for Dummies

The rise of ransomware over the past few years is an ever-growing problem that has quickly become an extremely lucrative…

Guest Blog | A Show of (Brute) Force: Crysis Ransomware Found Targeting Australian and New Zealand Businesses – Trend Micro

Crysis (detected by Trend Micro as RANSOM_CRYSIS.A), a ransomware family first detected in February 2016, has been spotted targeting businesses…

Ransomware: Plug the gaps in your defence strategy

By Richard Dornhart, National Security Practice Mananger, Data#3 [Reading time: 1 min] Dealing with ransomware is becoming increasingly…

Ransomware takes aim at Australian organisations

By Richard Dornhart, National Security Practice Mananger, Data#3 [Reading time: 1 min] There is mounting evidence that ransomware…