Guardian Digital Blog

We post our thoughts, insights, and leads here. Keep in touch by RSS feed, an email subscription, or just checking back here every so often. 

Requires Proper Configuration  Office 365 must be set up and configured correctly to prevent misconfiguration vulnerabilities. This process requires IT expertise that many SMBs lack, and Office 365 fails to bolster IT security with the expert fully-managed services required to ensure proper setup, provide ongoing system monitoring and maintenance, and offer the guidance that is needed Write comment (0 Comments)

Open Source is currently being recognized by more organizations than ever before for its ability to give rise to flexible, cost-effective and exceptionally secure software and technologies. Currently, over 75 percent of organizations worldwide are contributing to and consuming open-source software and products. The open-source community is expected to continue to grow and thrive in the coming years, which will further increase the overall credibility of Open Source and enhance the various benefits that open-source options are able to offer businesses and individuals alike.

Write comment (0 Comments)

The tide is turning away from relying on endpoint protection alone, as businesses are quickly recognizing that protection that works at the client level on devices such as laptops, desktops and mobile devices is limited in its ability to safeguard users and key assets against phishing, ransomware and other dangerous threats. Despite the widespread use of endpoint protection, cyberattacks and breaches - over 90% of which are initiated via email - are occurring at an unprecedented rate, with one in five businesses getting hacked daily. 

Write comment (0 Comments)

In the wake of the recent Colonial Pipeline ransomware attack that shut down one of the largest US pipelines for nearly a week, President Biden signed an executive order placing strict new standards on the cybersecurity of all software sold to the federal government. Part of a broad, multi-layered initiative to improve national security, this order is the latest effort in a major shift from incident response to putting pressure on companies to develop more secure software or risk being locked out of federal contracts.

Write comment (0 Comments)

In this era of sophisticated modern cyberattacks, how can you be sure that the email in your inbox is really from your bank? Can the link within it really be trusted?

Write comment (0 Comments)

The prevalence and impact of ransomware has become clearly apparent. Earlier this month, the closure of one of the US' largest pipelines due to ransomware highlighted the real-world consequences of a successful cyberattack. Ransomware attacks dominate security news headlines daily, so much so that people have begun to dismiss them as inevitable. But this is far from the truth. While ransomware is a serious threat to all  businesses, the good new is that these devastating attacks can be prevented with a proactive, multi-layered email security solution in place. This article will explain everything you need to know about ransomware and ransomware protection to safeguard your users, your key assets and your reputation.

Write comment (0 Comments)

Blog Articles