Ransomware attacks have become a growing concern for organisations of all sizes in Australia and New Zealand, resulting in significant…
Welcome to part 1 of our 3-part blog series, exploring data protection options and considerations for when you’re operating in…
Nearly one-third of all business-critical data resides in SaaS applications today. One of the most widely used…
It’s a common misconception that cloud and SaaS data doesn’t need to have a backup. However, just because data…
Legacy data management environments are complex and siloed, leading to unnecessary expense and overheads that today’s IT teams simply don’t…
In our previous post, we looked at what’s driving the increased interest in Cohesity and introduced a few use…
There has been a quiet evolution taking place in an area that often gets overlooked when it comes to technology…
Cybercrime has skyrocketed during COVID-19 and while thankfully, the door is firmly closed on the year that was…
Written in collaboration with Lawrence Ang and Dilupa Ranatunga of Veeam This is the second part of…
The time has finally arrived! On January 14, Microsoft formally announced the end of support for Windows 7. If you…
Recently, I have had many conversations with connections in several industries that have encountered a recent run of phishing emails.
More and more of our critical data, applications and infrastructure are moving from behind the firewall to the cloud –…
The shift of workloads into the cloud continues at an unprecedented pace as organisations seek innovation and productivity gains. However,…
A New Solution for Cloud App Security Symantec CloudSOC is a next generation cloud access security broker (CASB 2.0) solution…
Business is all about balancing risk and opportunity. Nowhere, perhaps, is this clearer than in the IT department, where the…
Hosting on the Microsoft Azure platform is a fast and simple method to deploy and manage web-based applications. Countless…
When you use Office 365 every day, it can be easy to forget just how powerful it has become…
Imagine being critically ill in the back of an ambulance, when just minutes from your nearest hospital you’re suddenly diverted…
End-users move constantly between devices and locations to access data when and where they need it for uninterrupted productivity. There…
I’ve seen a lot of evolution in desktop operating systems (OS), both in the product itself, and how it has…
It’s a message every IT manager dreads. ‘Your personal files are encrypted by CTB-Locker. To decrypt the files, you need…
The rise of ransomware over the past few years is an ever-growing problem that has quickly become an extremely lucrative…
Crysis (detected by Trend Micro as RANSOM_CRYSIS.A), a ransomware family first detected in February 2016, has been spotted targeting businesses…
By Richard Dornhart, National Security Practice Mananger, Data#3 [Reading time: 1 min] Dealing with ransomware is becoming increasingly…
By Richard Dornhart, National Security Practice Mananger, Data#3 [Reading time: 1 min] There is mounting evidence that ransomware…
Contact