Cybersecurity, Cyber Recovery and the Fight Against AI
Cybersecurity has always been a high-stakes game of cat and mouse. Defenders build taller walls, and attackers find longer ladders. But with the rapid rise of artificial intelligence (AI), the…
Cybersecurity has always been a high-stakes game of cat and mouse. Defenders build taller walls, and attackers find longer ladders. But with the rapid rise of artificial intelligence (AI), the…
Like Halloween, October is also Cybersecurity Awareness Month, a time for organizations and individuals to sharpen their focus on data protection. With cybercrime rates soaring since 2020, this annual reminder…
The reality is clear: passwords remain one of the most-targeted—and most vulnerable—gateways into business IT environments. As cyber threats increase and evolve, relying on outdated password practices simply isn’t enough…
In honor of Cybersecurity Awareness Month, we’re focusing on ways to avoid cyber scams. It may sound simple, but it isn’t, especially since cybercriminals are getting more and more clever…
We just passed the autumnal equinox and that means we have officially entered the fall season, and for many people this is the signal to begin indulging in everything…
Major VMware Partnership Announcement and How 11:11 Systems Keeps You Moving Forward Broadcom’s recent announcement to retire the VMware Advantage Partner program has left many organizations questioning their virtualization strategy.…
In my previous post, we explored the reasons and methods for safeguarding Microsoft Entra ID data using Veeam Backup & Replication. While having secure, encrypted backups is essential, their…
How to Configure Veeam Backup & Replication to Protect Entra ID If you’re not familiar with Entra, you might still think of it as “the artist formerly known as Azure…
In 2024, ransomware continues to be the most prevalent form of cyber-attack, affecting three out of four organisations, according to Veeam. The increasing frequency and sophistication of these attacks are…
Prompted by a new era of cyber-attacks surging downtime and data breaches, the Digital Operational Resilience Act (DORA) regulation came into force on 17th of January to reshape how organisations…