-
Parablu Signs Distribution Agreement with Clouds Dubai
- November 20, 2018
- Posted by: admin
- Categories: Backup, IT Security
No CommentsThe partnership is aimed at making available Parablu’s suite of award-winning cloud data management solutions to enterprises in the middle-east Parablu, an award-winning leader in the secure data management solutions space, today announced its distribution agreement with Clouds Dubai, a leading IT Security distributor based in the UAE. As a part of this partnership, Clouds
-
Heimdal Thor Enterprise wins Best Anti-Malware Solution from Computing Security Awards 2018
- October 18, 2018
- Posted by: admin
- Categories: IT Security, Ramsomware
On Thursday, October 11 Heimdal Thor Enterprise was rewarded on the stage of Computing Security Awards 2018 with Best Anti-Malware Solution of the Year. Organized by Computing Security, one of the most influential and widely read cybersecurity publications, Computing Security Awards 2018 saw 12 products nominated for Anti-Malware Solution of the Year. Out of them, Thor
-
100% utilization of Microsoft OneDrive for Backup
- September 7, 2018
- Posted by: admin
- Categories: Backup, Cloud Backup, IT Security
ParaBlu’s integration with Microsoft OneDrive will help companies utilize OneDrive storage as a backup target for endpoints without requiring to spend for additional storage on the cloud or on-premise. BlueVault with Microsoft OneDrive for Business Organizations can use Microsoft OneDrive for Business as a Backup target for endpoints. Parablu’s BluVault is a powerful and secure
-
Third-Party Providers – Managing Insider Risks
- August 14, 2018
- Posted by: admin
- Category: IT Security
Working with subcontractors has many benefits: it allows companies to increase productivity and efficiency, employ highly qualified experts, and cut costs. There also are drawbacks, though, and one of them is the risk that your third-party provider will prove a weak link in your cybersecurity. Fifty-six percent of organizations surveyed by the Ponemon Institute admitted to
-
The Dangers From Within – Insider Threats
- July 8, 2018
- Posted by: admin
- Category: IT Security
Security threats can appear from anywhere, most of them tend to occur from the inside. You may not think it, but the biggest threat to your company could be your very own employees – insider threats. Businesses tend to put their focus on internet-based attacks, rather than human-based attacks. However, insiders can cause more damage
-
Privileged Session Recording & Management
- June 12, 2018
- Posted by: admin
- Category: IT Security
An appropriate level of privileged account control and management plays a significant role in ensuring your organization’s cybersecurity. Verizon reports that in 2017, privilege misuse was behind 12% of all security breaches. And according to Gartner, by 2020, the lack of Privileged Account Management (PAM) processes will be the cause of more than half of
-
Does Security Awareness Trainings Even Work?
- May 21, 2018
- Posted by: admin
- Category: IT Security
With countless hours spent on crafting and delivering mind-numbing PowerPoint presentations, you’ll be forgiven for asking the question: “does security awareness trainings even work?”. Cyber attacks have become so commonplace that any organisation, no matter what size or sector, is likely to be hit at some point in time. Some organisations might use this as
-
Shadow IT: What are the risks and how can you mitigate them?
- May 8, 2018
- Posted by: admin
- Categories: Employee Monitoring, IT Security
Shadow IT is one of the most common problems companies face today. With the increasing number of people bringing their devices to work and the constant appearance of new software solutions and cloud services, employees are using more and more technologies without notifying the corporate IT team about them. And usually, they don’t even realize
-
IT Security in higher education – spotting the attacker
- April 22, 2018
- Posted by: admin
- Category: IT Security
It’s already a given that spotting an attacker is difficult in IT Security – they use compromised credentials to access any and all data available to that account. This means that the attacker is simply accessing whatever data the user was already given access to. So, how are you supposed to spot inappropriate access when
-
usecure appoints Clouds Dubai as usecure distributor in Middle East
- April 16, 2018
- Posted by: admin
- Category: IT Security
usecure Distributor partnership sees security awareness training specialist expanding to the Middle East usecure Ltd, a leading provider of cybersecurity awareness training, has launched its channel partners in the Middle East by appointing Clouds Dubai as usecure distributor. The usecure distributor partnership with Clouds Dubai offers local support for both local partners and customers in