
Defend against ransomware or the causes of ransomware?
Recently I noticed the results of a survey carried out by security detection and response specialists SecureWorks that asked the...

Building Zero Trust Security with Microsoft Cloud Tools
In part one of this two-part series, I introduced the idea that for those who had adopted the Microsoft cloud (or any other kind of cloud...

Adopted the Microsoft Cloud? Then better adapt your security model
In this two-part post, I look at why, if you have adopted Microsoft's cloud, then you need to adapt your security model. Have you adopted...

Some unexpected outcomes
Yesterday we ran one of our regular customer events and as usual we had a great response using Teams. We take great pride at Gardner in...

Securing Our Newly Distributed Workforce
One of the most significant changes most of us have seen since those fateful days in March 2020 is how we have adapted and found value in...

Modernising your Cybersecurity Playbook
A few weeks back I was asked by cybersecurity vendor Acronis to present at their "Modernising your Cybersecurity Playbook" event....

Microsoft HAFNIUM hack – Take action now
Unless you’ve been off-radar the past few weeks you’ll have seen Microsoft scrambling to patch a series of critical zero-day exploits...

Backing up Microsoft 365 and Teams with Veeam
Microsoft’s 365 platform has increasingly become a staple in the modern enterprise, with many businesses either having already moved to...

Covid19 - Remote Working Bulletin
OK, so you have an immediate requirement to provide remote working to maintain some degree of productivity and the business is stating...

What’s New in Catalogic ECX
Provides a single tool for snapshot and replication management and data re-use functionality (SQL, VMWare, Oracle) Many enterprises today...