Our Blog
Home / Blog
Sensitive data exposure – how breaches happen
The term sensitive data exposure means letting unauthorized parties access stored or transmitted sensitive information such as credit card numbers or passwords. Most major security breaches worldwide result in some kind of sensitive...
IDENTIFYING WASTE IN MICROSOFT 365
The pandemic has arguably been the greatest accelerator of digital transformation, spurring a global move to remote working, and forever altering the way we work. Many organizations have risen to the challenge, adopting new processes and tools to continue to work...
Robotic Process Automation: Company Investment or Money-Saving Tool?
Everything is getting better, faster, and going further all the time: The digital transformation and cloud computing are changing our day-to-day lives in many ways, both personally and professionally. But aside from those changes to our work life, another...
SaaS Sprawl Is More Than a Money Problem
At the start of the pandemic, businesses went to extraordinary lengths to remain productive. The workforce went home to work, and IT got busy bringing on new collaboration tools and cloud apps to support the forced new normal. This rush to cloud at least partly...
(Un)expected Lessons in Cybersecurity – Business and Security Strategies for The Post-Pandemic Unbound Enterprise
As long-time security practitioners, many of us probably at least once thought or said that ‘we knew something like this would be possible’. However, none of us could have known what would be the realities, including duration and impacts of the pandemic nor what the...