<
>

Why You Have to Backup Office 365

With over 180 million users, Microsoft’s Office 365 is one of the most widely used SaaS by organisations around the world. While other competitors are offering similar services, Office 365 remains the top choice for most...

Top Data Challenges Facing Modern Businesses and How to Conquer Them

Data is becoming a critical component for success for businesses that are embarking on a digital transformation journey. This is because data forms the basis of what drives every transforming business forward – from...

Southeast Asian Businesses Must Adapt to Survive in the Shadow of the US-China Trade War

Blog by: Seth Ravin, CEO of Rimini Street The US-China trade war is impacting businesses at every level, particularly since additional U.S. tariffs on Chinese exports took effect in the latter half of 2019. The...

The Future Next Door for Cloud Computing in Malaysia

By: Catherine Lian, Managing Director, IBM Malaysia After decades of experiencing a slow burn, cloud computing has caught the imagination of the industry all over again. The IT industry hailed 2019 as a banner...

Lessons to Learn from Real-World Data Breaches

Cybersecurity breaches are becoming a serious concern for organisations. According to a study by IBM Security, the cost of a data breach has risen by 12% over the last five years. Today, the average data breach costs...

Why Is Visibility Crucial for Cloud Security?

Cloud services continue to be the main agenda for businesses in their digital transformation journey. As more businesses continue to use the cloud, be it for storage, backup or processing workloads, the risks for businesses are...

Implementing an Extra Level of Security for Emails

Emails are important in any organisation. Be it for communicating or marketing, almost all employees are assigned to a company email the moment they join an organisation. While larger enterprises would often have their own...

Five Multi-Cloud Security Threats For Which You Must Be Prepared

Moving all your data onto the cloud is the best way of ensuring you’re meeting your digital transformation needs. But at the same time, you will want to be sure that your data is safe and secure. While the on-premises...

Why Shadow IT Is a Major Target for Cyber Attacks

As business users using IT become increasingly used to running apps in their personal lives, the growth of “Shadow IT” has darkened corporate IT departments. Shadow IT is a term that is used to describe unsanctioned...

Filling the Security Gaps In Your Multi-Cloud

For the majority of companies today, their journey to cloud has become a vital component of digital business transformation. However, being dependent on just one cloud provider for all of your IT requirements no longer makes good...