Skip to content

Data Security

Data Loss Prevention

Exploring Data Loss Prevention – Data Classification & SharePoint

[kc_row _id=”338007″][kc_column width=”12/12″ video_mute=”no” _id=”528551″][kc_column_text _id=”842053″ css_custom=”{`kc-css`:{}}”]Protecting Sensitive Information Protecting sensitive information is now more important than ever. Whether you’re…

Our Overview of CyberSmart Active Protect

Our Overview of CyberSmart Active Protect

[kc_row _id=”495012″][kc_column width=”12/12″ video_mute=”no” _id=”912718″][kc_column_text _id=”984547″ css_custom=”{`kc-css`:{}}”]Cybersecurity is paramount for businesses of all sizes. The CyberSmart SME cost of living…

Backup as a Service (BaaS): Ensuring Data Security and Business Continuity

Backup as a Service (BaaS): Ensuring Data Security and Business Continuity

[kc_row _id=”823632″][kc_column width=”12/12″ video_mute=”no” _id=”276561″][kc_column_text _id=”899571″ css_custom=”{`kc-css`:{}}”]What is Backup as a Service? Backup as a Service (BaaS) is a cloud-based…

A Spotlight on Microsoft Defender for Office 365 for Email Security

A Spotlight on Microsoft Defender for Office 365 for Email Security

[kc_row _id=”499332″][kc_column width=”12/12″ video_mute=”no” _id=”661621″][kc_column_text _id=”159315″]Microsoft needs no introduction. As a leader in the technology sector, Microsoft offers robust solutions…

Dark Web Monitoring

Protecting Your Business with Dark Web Monitoring

[kc_row _id=”841412″ cols_gap=”{`kc-css`:{}}” use_container=”yes” force=”__empty__” css_custom=”{`kc-css`:{`any`:{`background`:{`background|`:`eyJjb2xvciI6InRyYW5zcGFyZW50IiwibGluZWFyR3JhZGllbnQiOlsiIl0sImltYWdlIjoibm9uZSIsInBvc2l0aW9uIjoiMCUgMCUiLCJzaXplIjoiYXV0byIsInJlcGVhdCI6InJlcGVhdCIsImF0dGFjaG1lbnQiOiJzY3JvbGwiLCJhZHZhbmNlZCI6MH0=`}}}}”][kc_column width=”12/12″ video_mute=”no” _id=”346892″][kc_column_text _id=”138158″]Introducing Vissensa’s New Service with Dark Web ID Today the dark…

Email Spoofing – Consequences of a Successful Attack?

Email Spoofing – Consequences of a Successful Attack?

[kc_row _id=”553440″][kc_column width=”12/12″ video_mute=”no” _id=”757875″][kc_column_text _id=”764737″]This blog is a supplement to the technical guide Vissensa has written around the use…

Cyber Security Keyboard

Email Spoofing – Configuring Email Security

[kc_row _id=”802682″][kc_column width=”12/12″ video_mute=”no” _id=”534512″][kc_column_text _id=”614160″]In today’s digital landscape, email spoofing is a prevalent technique used by cybercriminals to deceive…

Secure Email Communication

What is Email Spoofing? – Ensuring Secure Email Communication

[kc_row _id=”292617″][kc_column width=”12/12″ video_mute=”no” _id=”214651″][kc_column_text _id=”632336″]Is Email Spoofing Damaging Your Reputation? The landscape for cyber-crime is ever changing and in…

SonicWall Cyber Threat Report

SonicWall Cyber Threat Report

[kc_row _id=”737550″][kc_column width=”12/12″ video_mute=”no” _id=”621074″][kc_column_text _id=”65059″] As part of our partnership with SonicWall, we have been focusing on cyber threats,…

Laptop computer displaying logo of Veeam Software

Veeam Data Platform – V12 Explained

[kc_row cols_gap=”{`kc-css`:{}}” use_container=”yes” force=”yes” css_custom=”{`kc-css`:{`any`:{`background`:{`background|`:`eyJjb2xvciI6IiNmZmZmZmYiLCJsaW5lYXJHcmFkaWVudCI6WyIiXSwiaW1hZ2UiOiJub25lIiwicG9zaXRpb24iOiIwJSAwJSIsInNpemUiOiJhdXRvIiwicmVwZWF0IjoicmVwZWF0IiwiYXR0YWNobWVudCI6InNjcm9sbCIsImFkdmFuY2VkIjowfQ==`},`box`:{`padding|`:`40px inherit 40px inherit`}}}}” _id=”952951″][kc_column width=”12/12″ video_mute=”no” _id=”784026″][kc_column_text _id=”245163″] With organizations recognizing the world as a…

Back To Top
No results found...