Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A Modern Approach to Managing Vulnerabilities

Organizations today rely on an increasing number of applications installed on enterprise devices just to “keep the lights on” and business functioning. Being able to immediately access emails, files, communications, and web conferencing tools has never been more critical with the rise of remote and hybrid work.
Featured Post

Why Codefinger represents a new stage in the evolution of ransomware

Forget typical ransomware! Codefinger hijacked cloud keys directly, exposing backup flaws and shared responsibility risks. Time to rethink defence. If you didn't pay much attention to news of the recent Codefinger ransomware attack, it's possibly because ransomware has become so prevalent that major incidents no longer feel notable. But Codefinger is not just another ransomware breach to add to the list of incidents where businesses lost sensitive data to attackers. In key respects, Codefinger represents a substantially new type of ransomware attack.
Featured Post

Level-up Your Cloud Success with AWS and MSP expertise

For the modern enterprise, data is the foundational element that allows businesses to operate. As information technology continues to evolve and grow in complexity, organisations need to store and manage greater quantities of mission critical data. To achieve this, businesses are increasingly adopting cloud computing, with many opting to make use of one of the public clouds, such as AWS.

Elevated Cloud Backups With 11:11 Systems

Data protection is no longer just a best practice; it’s a mission-critical priority for every modern business. The ability to safeguard your data, meet compliance requirements, and restore operations quickly is what sets organizations apart in today’s digital-first world. That’s where 11:11 Systems steps in with its Advanced Backup solutions, designed to empower businesses with comprehensive, flexible, and easy-to-manage data protection tools.

The Remedy Against Ransomware: Insights from Our April 2025 Webinar

Cyber attacks, including ransomware, have never been so ubiquitous. No organization, regardless of size or industry, is truly immune to ransomware attacks. While some may have better security measures and faster recovery plans, the threat is pervasive and can impact even the most sophisticated businesses. All organizations should have robust cyber resilience strategies in place, including backup and recovery plans, to mitigate the impact of a potential attack.
Featured Post

Overcoming the Cloud of Uncertainty

The cloud industry has evolved significantly over the years, with VMware standing out as a key player in cloud computing, its reputation in the market helped it gain significant market share and facilitated a successful acquisition by tech giant Broadcom in November 2023. It has been over a year since this happened and, as with all acquisitions, it prompted companies to consider how it might impact their requirements.

Walking a Tightrope: Creating Effective Password Policies in Your Organization

Tightrope walking, or funambulism, is a mesmerizing blend of skill, balance, and focus. Performers traverse a thin, elevated rope, using tools like balance poles to stabilize and counter gravity. It demands precise movements, mental composure, and confidence to overcome fear. Rooted in ancient traditions, it remains a captivating symbol of risk and control.

Getting Started with 11:11 Cyber Vault for Cohesity

Leveraging this solution should help you optimize the cost of your overall Cohesity solution and adhere with a 3-2-1-1-0 protection strategy. This is part of the wider release of Cyber Vault products from 11:11 with versions for Veeam and Zerto coming shortly. We’ve been focusing on the deployment of the base Cohesity capability, Cloud Archive v2, lately.