Refine your search by content type

Post

The Essential Guide to Cloud Security: Protecting Your Data in the Cloud

The public cloud offers a multitude of advantages for businesses of all sizes. From scalability and cost-effectiveness to increased collaboration…

Read more

Post

5 Biggest Microsoft 365 Security Gaps

5 Biggest Microsoft 365 Security Gaps (and how to close them) Microsoft 365 offers a powerful suite of productivity tools,…

Read more

Post

Why Basic Cyber Hygiene is Critical for Microsoft 365 security

Breaking news, cyberattacks are on the rise Yes we know, of course we would say that but the truth of…

Read more

Post

Microsoft 365 Business Standard or Business Premium – which one is right for you?

The choice between M365 Business Standard and M365 Business Premium is nuanced and dependent on your specific business context.

Read more

Post

Guarding the Cloud: Top three risks for your Azure security

You hold a significant responsibility for securing your Azure subscription. Here are the top three Azure security risks and how…

Read more

Post

Ekco earns Microsoft’s Identity & Access Management Specialization

The Microsoft Identity & Access Management Specialization highlights Ekco's skills and experience in protecting Active Directory, Azure AD, and the…

Read more

Post

Reduce the damage that hackers can do

You can never be 100% protected against a cyber attack. That’s why you need to think about how to minimise…

Read more

Post

What we can learn from the Belgian police data breach

The cause of the November 2022 breach of the Belgian police is all too common – a weak password and…

Read more

Page

IAM

Identity Management Identity-driven security solutions allow you to securely manage users, applications, and devices. Ensuring secure access to corporate applications,…

Read more

Post

Worried about your company’s cybersecurity? Protection alone simply won’t cut it

The majority of cyber threats businesses faced 10 years ago were relatively minor infringements. But these days cyber attacks are…

Read more

Post

What IT security do you need to reduce your Cyber Insurance costs?

With cyber attacks on the rise, many companies have included cyber insurance as part of their IT security plan. Here…

Read more

Post

Security Defaults: Microsoft changes baseline security requirements

Microsoft looks to secure 60 million vulnerable accounts by making Security Defaults like multi-factor authentication standard. Learn what it means…

Read more