Backup vs archiving: when, why and how

There is often confusion between the two complementary processes of data backup and information archiving. In this article, we compare them and discuss the specific needs addressed by each one. We also review why organisations continue to need both a backup and an archiving solution even after they have moved to Microsoft Office 365. Comparing…

How to improve user productivity – without a theory lesson

A core objective of every business is to ensure that revenue consistently outpaces costs. Technology plays a huge role in achieving that goal. Interruptions—whether hardware or software failure, user fatigue, or vexing collaboration issues—are significant inhibitors of productivity that employers must keep to a minimum to prevent adverse impacts on revenue. Demystify the productivity problem…

The evolution of spear phishing – is your business prepared?

Why is phishing spelt with a ph? What makes spear phishing different? Who’s a potential target? Spear phishing is a huge concern to organisations around the world. It’s therefore crucial to understand that the evolution of spear phishing, key targets, and best practices to prevent these pervasive attacks. Many people think that spear phishing is just…

Guaranteed peace of mind with email security

The bad news? A single security strategy won’t protect your business while threats are evolving, improving, and growing in sophistication. But the good news is that there are solutions. The polymorphic nature of modern cyber threats renders traditional signature-based defence mechanisms inadequate. On the other hand, in-depth defence techniques like sandboxing are expensive and come…