Category: Compliance

Advanced Email Threat Protection (ATP) Vs. Traditional Email Security

Modern Cyber Attacks are Bypassing Traditional Email Security Modern cyber attacks are evolving at a faster rate than ever before, not only in terms of sophistication, but also in the sheer number of cybercrime operations active today. New ransomware attack models and new strains of other malware threats are designed to evade traditional detection, and…
Read more

How Ransomware-as-a-Service (RaaS) Attacks Have Changed the Game Forever

Ransomware is surging wildly out of control. It seems you can’t even glance at the news today without hearing of another organisation falling victim to a major breach. In 2021, you are currently more likely to be hit by ransomware than not. 84% of organisations have reported a “high concern” incident relating to ransomware in…
Read more

Microsoft Defender for Office 365 (ATP) Vs. Third Party Security

Security Around Office 365 Has Changed Over the Years… In the face of ever-evolving threats, protecting against phishing, malware, and ransomware is a critical concern for organisations all over the world. 91% of cyber-attacks start with an email, and with over 230 million active business users now using Microsoft Office 365, advanced security for 365…
Read more

5 Reasons to Choose E-ZU as Your Preferred Microsoft CSP

Whether your organisation is right at the beginning of your journey to Microsoft Office 365, or perhaps you’re already well under way and now it’s about which direction enables you to make the most of Microsoft 365 on your ongoing voyage in the Modern Workplace, it can be difficult to know what makes a good…
Read more

What is a Microsoft CSP (Cloud Solution Provider)?

What is the Microsoft CSP Program? Simply put, Microsoft describes its Cloud Solution Provider (CSP) Program as delivering the best cloud solutions to fit customers’ business needs, by means of deeper engagement and added value. Buying through the CSP Program means that an organisation purchases a ‘pay as you go’ consumption arrangement with a trusted…
Read more

A Beginner’s Guide to… Phishing

A Beginner’s Guide to… Phishing According to the Wall Street Journal; 97% of all cyber-attacks start with Phishing. When you think about it, there’s no wonder really when you consider that most of us are using Email on a daily basis for both Personal and Business use. In fact, I think it’s safe to say…
Read more

4 Reasons Why eLearning Helps Mitigate Cyber-Attacks

4 Ways eLearning Can Help Mitigate Cyber-attacks Proofpoint’s yearly report, The Human Factor, has revealed that 95% of malicious cyber-attacks “incorporate social engineering to trick users into installing malware”, as well as the astonishing realisation that more than 99% of cyber-attacks need human interaction to succeed. The increase in Social Engineering attacks is a testament…
Read more

Remote Working and the Risks to Consider

Remote Working and The Risks for Management to Consider The Covid 19 epidemic with subsequent restrictions placed on companies and private individuals has directly impacted ways of working. As a direct result many organisations including here at E-ZU have non-essential workers working from home. For many businesses this has meant rapid progressions in their IT…
Read more

8 Reasons You Need to Backup Office 365

1. Office 365’s Recycle Bin is NOT a Backup Solution The Office 365 recycle bin is a handy tool but it is not designed as a backup solution, and it doesn’t work as one. For one thing, its 93-day email retention period is inadequate for most policy and regulatory compliance. For another, restoring lost files…
Read more