Managed Services

Application Ring-Fencing and Storage Control

In our previous edition of this newsletter, we had discussed how ZTNA (Zero Trust Network Access) can be used to whitelist applications…

3 years ago

Zero-Trust Network Access

As users continue to work from anywhere and IoT devices flood networks and operational environments, continuous verification of all users…

3 years ago

Top 5 Cybersecurity Recommendations

There has been a sharp rise in cyber-attacks ever since the coronavirus (COVID-19) pandemic and global business have been suffering…

3 years ago

Top 13 Email Threats You Should Know About

A cyberattack can affect your business in many ways, depending on its nature, scope, and severity. According to the FBI’s…

3 years ago

Six (6) Steps to address Zero-Day Exploits on Exchange Servers

Four (4) zero-day vulnerabilities in Microsoft Exchange Server are being actively exploited by Hafnium, which the State Department believes is…

3 years ago

Serverless Computing

Serverless computing is a misnomer. Computing is impossible without the presence of a machine. Just like a virus needs a host, code…

3 years ago

What can we learn from recent AWS Outage

On November 28, 2020, the AWS outage took down a large portion of the internet and affected thousands of companies…

3 years ago

Six Essential Components of a Business Continuity Plan

The terms Business Continuity (BC) and Disaster Recovery (DR) have often been used interchangeably. DR usually involves recovering data and software…

3 years ago

4 Checks to Authenticate Sender of an Email

With phishing and spam emails on the rise, they not only pose cybersecurity threat to the recipient’s organization, but also…

3 years ago

“4 Important Conclusions from our Remote Work Survey”

In the month of April, we conducted a survey of people working remotely to learn about the challenges and opportunities…

4 years ago