Blog Posts by Sergey Balynsky
Can Antivirus Protect Against Ransomware?
March 9, 2022Can antivirus protect against ransomware? The short answer is it depends. In this article, we’ll... Read more
NIST Cybersecurity Framework for Enterprises
February 14, 2022The National Institute of Standards and Technology (NIST) is a non-regulatory agency helping organizations through... Read more
OAuth Authentication Fundamentals for SecOps
December 31, 2021What is OAuth? What role does it play in granting permissions? How are attackers making... Read more
How to Prevent Zero Day Attacks?
December 2, 2021Computer software is often prone to attacks. This could be due to internal or external... Read more
MSPs Ransomware Protection Guide: Keeping Clients Protected
December 1, 2021Managed Service Providers frequently become targets of ransomware. The consequences of this event can be... Read more
Easy Steps to Recover Deleted SharePoint File
November 22, 2021Before we jump into the explanation of how you can recover deleted Sharepoint file, let’s quickly... Read more
What is the Reason for Encrypting Data in a Backup: Uneasy Answer B...
November 19, 2021Cloud backup security is becoming an increasingly important issue with the extensive cloud technology adoption.... Read more
How to Secure Google Drive
November 17, 2021Cloud storage has revolutionized the way data can be accessed, edited, shared, and otherwise worked... Read more
Office 365 Disaster Recovery Plan: 5 Critical Mistakes to Avoid
November 16, 2021So you’ve decided to back up your organization’s Office 365. You already know that backup... Read more
Data Leak Prevention Checklist for Employee Leave Case
November 12, 2021One of our customers, a company that is the leading CRM solutions provider, faced a... Read more
How to Develop an Effective Cloud Strategy
November 10, 2021A poor cloud strategy includes everything from no planning at all to performing migrations to... Read more
Google Drive Ransomware Recovery: 3 Best Practices
November 3, 2021In this article, we discuss the methods of Google Drive ransomware recovery as well as... Read more
Data Loss Prevention Tools: Everything You Need to Know
October 16, 2021As more organizations are moving their data and operations to the cloud, you should consider... Read more
Microsoft Office 365 Ransomware: Cybersecurity Guide for SecOps
October 15, 2021Global pandemics and the transition to WFH operations made businesses more vulnerable to cyber threats,... Read more
What You Should Know About Homomorphic Encryption
October 2, 2021There is a weakness with traditional encryption techniques. What is that weakness? Also, what is... Read more
SOC 2 Compliance Checklist For Enterprises
March 9, 2021SOC 2 is required for companies that store or process sensitive information. So if your... Read more
5 Things to Know About OneDrive Security
April 30, 2020Keeping your data secure is not a piece of cake these days. With all the... Read more
What is Data Encryption and Why is it Important?
December 1, 2019There is perhaps no more basic security mechanism than data encryption. Encryption is used in... Read more