Entries by Mihai

The Future of Cybersecurity

The massive SolarWinds breach made it crystal clear that the cybersecurity threat only gets worse with time because the tools are more sophisticated, and the stakes are higher. NOTE! According to Forrester, businesses are taking cybersecurity more seriously as enterprises are predicted to spend $12.6B on cloud security tools only, by 2023, up from $5.6B […]

Cloud Overspend: Main Causes & Mitigation Solutions

According to Gartner, spending on cloud system infrastructure services is expected to grow from $44 billion in 2019 to $63 billion in 2020, reaching $81 billion by 2022. The cloud offers a level of flexibility that companies cannot get by using in-house servers. Scaling up and down is almost always easy. Also, as we saw […]

Business Email Compromise Attacks

The Business Email Compromise (BEC) attack is an increasingly popular type of cyberattack because the success rate is quite high. A BEC attack impersonates a familiar person, such as a business partner or an employee, tricking the victim into buying gift cards or transferring expensive items to the hackers orchestrating the attack. Gift cards have […]

Business Data Security And Remote Working

Location flexibility is one of the benefits of telecommuting, but as remote working becomes standard practice, information security becomes more of a concern. From employees using unsecured Wi-Fi networks to workers bringing their own unsecured devices, remote work has added additional levels of security related concerns for organizations and their data. 71% of business decision […]

GSuite becomes Google Workspace

Last month, Google has announced Workspace, the brand-new name for all their productivity apps such as Gmail, Drive, Docs, Keep, Sheets, Calendar, Slides, Meet, etc. According to the company, Workspace isn’t just a new brand (a replacement for GSuite), it also offers a deeper integration between apps, helping users collaborate more efficiently, improving their experience […]

IT Advisory Services: Getting More Than Just Good Advice

All the buzz words are out there; virtual CIO (vCIO), IT Advisory Services, Technology Advisor, etc.  Yes, all the reasons why you should engage in such a service is important, but it should be more than just good advice. Let’s explain the key aspects of an IT Advisory practice, and what it can do for […]

Office 365 Multi-Factor Authentication

Multi-factor authentication (MFA) is commonly used to prevent a stranger from logging in, with or without a password. MFA improves the security of user logins. With Office 365 MFA, users are required to allow a phone call, a text message, or enter an app-generated number on their smartphone after correctly entering their username and password. […]

The Limitations of Private Browsing

While private and “incognito” modes can reduce your digital footprint online to an extent, there are still ways in which your activity can be tracked by malicious third-parties such as people on your network, the internet service provider, government agencies, and cyber criminals. NOTE: Private Browsing mode is also known as Incognito Mode in Google […]