Data Protection Considerations in Azure

There are many reasons why companies choose to leverage public cloud resources. One of the most common is that the cloud provider shares the responsibility for the infrastructure with the customer. This means that the consumer of cloud resources can spend more time and effort focusing on the application itself rather than on the underlying hardware. In the case of Infrastructure as a Service, the cloud provider typically owns resources from the virtual infrastructure down to the physical datacenters and everything in between, such as physical networking, physical storage and the hypervisor that your resources are running on. Learn here the key considerations on data protection in Azure. [Read more…]

Webinar Summary: Defense In Depth for Office 365

defense-in-depth-office-365-j-peter

In today’s security environment, email deserves serious attention. Ninety-one percent of cyber attacks arrive via links or attachments in emails. Eighty-five percent of companies have already fallen victim. [Read more…]

A brief history of ransomware: from fins to wings

ransomware fortinet evolution softchoice

The FBI recently published a report claiming that ransomware victims paid out over US$209 million just in the first quarter of 2016, compared to US$24 million for all of 2015. Ransomware has very quickly become the most fashionable malware on the market, flooding the threat landscape in ways never seen before. We are seeing new strains of ransomware almost every single day.

[Read more…]