Editor writes on a blog article

The SoftwareONE Blog

Bala Sethunathan

Bala Sathunathan

Bala Sethunathan

Director, Security Practice & CISO

Cybersecurity

security-is-not-privacy-ways-to-keep-personal-data-secure
  • 14 October 2020
  • Bala Sethunathan
  • Managed Security, Cybersecurity
  • Data Security, Data Backup

Security is Not Privacy: Ways to Keep Personal Data Secure

Organizations must know the difference between data security and privacy, the ways your data could be compromised, and how to keep it secure.

6 Enterprise Email Security Risks
  • 07 October 2020
  • Bala Sethunathan
  • Managed Security, Cybersecurity
  • Cyber Security

6 Enterprise Email Security Risks

When employees use their email, they could be vulnerable to risks. Read this post to understand what these risks are and how to protect against them.

Cyber Security Update August / September 2020
  • 07 September 2020
  • Bala Sethunathan
  • Cybersecurity, Managed Security
  • Ransomware

Cyber Security Update - August/September 2020

Data breaches like these show that one single breach can not only irreparably damage the firm’s brand, but also jeopardize clients’ names and operations. Read more about recent attacks.

securing-your-workforce-with-microsoft-atp-and-a-soc
  • 01 September 2020
  • Bala Sethunathan
  • Managed Security
  • Microsoft

Securing Workforces with ATP & SOC

Microsoft ATP promises cutting-edge security to remote workforces – but your workforce should still invest in a SOC to stay secure. Here’s why.

Cyber Security Update July 2020
  • 22 July 2020
  • Bala Sethunathan
  • Managed Security, Cybersecurity
  • Ransomware

Cyber Security Update - July 2020

Data breaches like these show that one single breach can not only irreparably damage an organization’s brand, but also jeopardize clients’ names and operations. Read more about recent attacks.

Protect Your Remote Workers against the new Voicemail Phishing Campaign

Protect Against Voicemail Phishing

Cybercriminals use fake voicemail messages to lure victims into entering their M365 email credentials. Learn how to protect your M365 environment.

{ "hideLoadMore": false }