ChatGPT and cybersecurity: What’s the outlook?

The intersection of ChatGPT and cybersecurity continues to dominate the IT news cycle. And with good reason — this technology and those like it (generative
Data privacy: 5 key steps

Having the basics in place is a great start. But what further measures can your business take to step up the strength of your data privacy?
The best ransomware protection? A response plan.

Ransomware attacks are on the rise. So what best practices should be followed to protect against ransomware?
Why cybersecurity awareness is key to levelling up your security posture

Why cybersecurity awareness among your workforce is a key component your security posture — and how to allocate budget to strengthen it.
10 essential layers of ransomware defence

A strategy consisting of layers to protect the organisation on multiple fronts is essential for ransomware defence.
Proact’s reaction to the Log4j vulnerability

The Log4j attack affected millions of systems in late 2021. Here, we discuss how Proact reacted to protect our customers and ourselves.
Five steps toward a united front against ransomware

Read our blog to find out five essential steps your organisation can take to put up a united front against ransomware.
Don’t let the lights go out this Christmas (on-demand)

On-demand(ENGLISH)
Join us as we explore the most common challenges organisations face, and why simply implementing security tools such as SIEM platforms, isn’t the solution.
Let’s talk… Keeping cybercriminals away from your backups (on-demand)

On-demand (ENGLISH)
Join our backup experts to discover the technologies and best practices that ensure an ‘air-gap’ between your live systems and your backup.
Cybercriminals and software: a means to a malicious end

Find out how cybercriminals have evolved their tactics to exploit software vulnerabilities, even the biggest vendors struggle to keep up.