Month: February 2020
There is often confusion between the two complementary processes of data backup and information archiving. In this article, we compare them and discuss the specific needs addressed by each one.
Why is phishing spelt with a ph? What makes spear phishing different? Who’s a potential target? Spear phishing is a huge concern to organisations around the world. It’s therefore crucial