Menu
18. 07. 2022
Data backups are crucial when it comes to protecting your data. This makes it all the more important to ensure that your backups are protected and available.For many companies, one data backup is sufficient. However, what they fail to understand is t...
Keep reading05. 07. 2022
Cybercrime cases are on the rise. At the same time, it is becoming increasingly easier to use the services offered to carry out cyberattacks. This method is called CaaS (Crime as a service). Ready-made cybercrime? Ransomware, the word that makes the ...
Keep reading21. 06. 2022
The difference between backup and archive is often misunderstood in companies. In the area of data integrity and legal regulations, both for backup and for archiving of data, there are far-reaching differences for companies. A backup includes the ACT...
Keep reading07. 06. 2022
Parallel to local installations, local storage space is also increasingly being replaced by cloud storage. Storage space is becoming cheaper and more and more companies are opting for cloud-based storage. What is cloud storage? Cloud storage is a m...
Keep reading31. 05. 2022
All these terms about phishing can be confusing. Here's a small dictionary-like list on some of them. Criminals exploit the fact that email remains the primary channel for conducting business. Phishing is one of the most prevalent forms of cybercrim...
Keep reading17. 05. 2022
Email continuity services help ensure that email messages are always delivered to the intended recipients even if there is a temporary disruption in email delivery from one provider to another. Email is a critical component of any company; employees...
Keep reading03. 05. 2022
1971: The email revolution A bit more than 50 years have passed since Ray Tomlinson sent the first email ever! It was in 1971. "Tomlinson's email program brought a complete revolution and fundamentally changed the way people communi...
Keep reading02. 05. 2022
Choosing the right strategy for e-mail archiving contributes significantly to how efficient e-mail archiving ultimately is. Basically, two types are used for e-mail archiving: Mailbox archiving With mailbox archiving, e-mails are copied from the ma...
Keep reading19. 04. 2022
As we know, spam can be more than annoying marketing campaigns; spam are vectors for phishing attempts and counterfeit messaging. That’s why Realtime Blackhole Lists (RBL) exist to serve the public interest and help Internet users mitigate cybersecur...
Keep reading05. 04. 2022
Email continuity services help ensure that email messages are always delivered to the intended recipients even if there is a temporary disruption in email delivery from one provider to another. According to recent phishing statistics, 96% of phishin...
Keep reading