Don’t Let Data Migration be a Show Stopper
Backup on the fly, literally! Sometimes data migration just doesn’t execute fast enough...
Next-level Awareness in IT Risk Management
Human error is one of the biggest risks when it comes to protecting data. That is why awareness training is a crucial weapon in the fight against cybercrime. Read more.
3 Typical Errors Found in IT Audits
IT audits helps your company keep focus on IT Risk Management and can reveal where you need to strengthen IT security and processes. See the 3 Typical Errors Found in IT Audits here
5 Questions a CFO Needs to Ask IT Security
IT security is business critical and should never be considered a mere expense: Done right, IT Security has the potential to accelerate a business, and it can be a disaster if the right security systems aren’t in place.
Documentation is Key to Compliance
Without documentation of your IT processes, you have no proof of their execution which means that they haven’t in fact been executed. This would be the strict conclusion of an IT audit. Read our article on IT audits.
Data Protection: What Works Today Could Be Non-Compliant Tomorrow
Just because your organization’s data protection practices are compliant with current corporate policies and industry requirements, doesn’t mean they will still be next month or a year from now.
Data Deduplication – Small Step big Difference
Why does data deduplication have such a big influence on backup performance and cost? Read more.
Get your IT Risk Priorities right for 2021
What kind of year will 2021 be from a risk management perspective? With the growing threat of cybercrime and the COVID-19 pandemic, it’s vital that you reevaluate your risk landscape to protect your business and IT plans.
Guide to Data Classification
Can you put a price-tag on your data? A tier-based approach to storage and backup lets you optimize performance and cut-cost at the same time.
The Looming Threat of Cyber-crime: VERY HIGH
A new report from the Danish Centre for Cyber Security examines the new cybercrime ecosystem and categorizes the cyber-threat as “VERY HIGH”.
New Report on the Cyber Threat Against IT Service Providers
IT service providers are attractive targets for hackers, and a new report from the Danish Centre for Cyber Security mentions several examples of cyber attacks against IT service providers in Denmark and abroad.
What is Separation of Duties (SoD)?
As protection from cybercrime and ransomware attacks, safeguarding backup integrity is crucial for the ability to reestablish operations. However, a backup alone is not enough to ensure business continuity.
What you Need to Know About Ransomware
Ransomware is currently the most widespread cybercrime business model. How does it work? Read more.
How a Typical Ransomware Attack Looks Like
New report from the Danish Centre for Cyber Security presents the most common attack methods for ransomware attacks and offers guidance into the best defense strategies on how to avoid them.