407-416-7955 info@cherubas.com
Select Page

Who has time to read the the countless product fliers, brochures, or watches vendor webinars.  But I do make time to read the Cherub cyber-blogs.  They are following (and most of the time are ahead of) the industry trends in cybersecurity and data protection while boiling it all down to easy reading.

Cindy Kelly

Security Manager, University of Georgia

What Is EDR and How Does It Fit Into Your Security Strategy?

What Is EDR and How Does It Fit Into Your Security Strategy?

Back in 2013, Gartner's Anton Chuvakin set out to name a new set of security solutions that sniff out suspicious activity on endpoints. After what he called “a long agonizing process that involved plenty of conversations with vendors, enterprises, and other analysts,"...

read more
Information Security: Your People, Your First Line of Defense

Information Security: Your People, Your First Line of Defense

A company can put together as many technology solutions or policies as it likes, but, in the end, its people are the most important element in information security. If the employees in your organization don’t feel personally invested in improving your organization’s...

read more
Phishing scams top the threat list

Phishing scams top the threat list

A staggering 96% of organizations say that e-mail phishing scams pose the biggest security risk facing their businesses over the next year. A further three quarters (76%) say the greatest and most persistent threat is the careless insider who unthinkingly clicks on...

read more
Top Reasons for Backing-up Office 365 is Critical

Top Reasons for Backing-up Office 365 is Critical

  Every business, especially the Enterprise, is grappling with the challenges of moving to the cloud. It isn’t a matter of IF, but a matter of WHEN and HOW. For tens of thousands of organizations, the WHEN is Today and the HOW is with Druva. Recently our adoption...

read more