Cybersecurity Trends & Predictions for 2021
Being able to retain customer trust has never been more important – or more difficult – following the events of 2020. With so much disarray and widespread changes to working patterns, such as the mass migration to remote working, the job of keeping businesses secure…
Get Insight in an Advanced Ransomware Threat
Cyberthreats, including devious attacks such as ransomware, spyware and malware, are among the most common IT challenges. What would you do in case your data is attacked and held ransom? Attacks have increased in numbers and complexity and spread to organisations of any size and…
Add Veeam to a Workgroup, Domain or Forest?
Microsoft Active Directory is the heart of the IT infrastructure for nearly every organization. When setting up the Veeam Availability infrastructure keep in mind the principle that a data protection system should not rely on the environment it is meant to protect in any way!…
How to install HyTrust KeyControl 5.1 in vSphere 6.7
In vSphere 6.7 VMware has added a new device called virtual TPM 2.0. Before you can use and add this device to virtual machines vSphere VM Encryption needs to be in place. Starting with vSphere 6.5, you can take advantage of Virtual Machine encryption. Encryption…