Terra Nova Blog

Check back often to see what’s new

The Most Dangerous Cloud Attack Methods In The Wild Today

The Most Dangerous Cloud Attack Methods In The Wild Today

The Most Dangerous Cloud Attack Methods In The Wild Today Source: SentinelOne.com The cybersecurity threat landscape is vast, and we are often faced with the challenge of keeping in touch with novel attack techniques and new attack surfaces. As enterprises continue to...

read more
5 Ways the Cloud Enables Business Communication

5 Ways the Cloud Enables Business Communication

5 Ways the Cloud Enables Business CommunicationSource: Intermedia.com Now that the cloud has become a mainstay in the business world, we’re starting to see the true impact of cloud business communications.   Most companies use the cloud — 91 percent use the public...

read more
SysJoker and DazzleSpy Malware Target macOS

SysJoker and DazzleSpy Malware Target macOS

SysJoker and DazzleSpy Malware Target macOSSource: SentinelOne.comAs last year closed out, we provided a round up of the previous 12 months of Mac malware, making the observation that, among other things, 2021’s macOS malware cohort saw a focus on spyware and the...

read more
8 Features You Need for High-Level Webinar Presentations

8 Features You Need for High-Level Webinar Presentations

8 Features You Need for High-Level Webinar PresentationsSource: Intermedia.com Webinars are a powerful medium for presenting education, product demonstrations, thought leadership, and more. They can be highly effective and translate into sales opportunities. When...

read more
Our Cybersecurity Predictions for 2022: What’s Next?

Our Cybersecurity Predictions for 2022: What’s Next?

Our Cybersecurity Predictions for 2022: What's NextSource: SentinelOne.com 22021 was a year in which everything escalated. The pandemic triggered more separation, more isolation, and a general unease in our ability to discern the good from the bad. In cybersecurity,...

read more
Top Email Security Risks Businesses Face in 2021

Top Email Security Risks Businesses Face in 2021

5 Common Cybersecurity Threats That Bypass Legacy Antivirus Source: Intermedia.com Risk is, unfortunately, part of every company’s technology ecosystem. Even with the best protections in place, security issues can still occur. Cyberattacks continue to evolve, so you...

read more
Moving to a Zero Trust Security Model

Moving to a Zero Trust Security Model

Moving to a Zero Trust Security ModelSource: SentinelOne.com Recent cyberattacks like those on Colonial Pipeline, along with trends like the shift towards remote work have made many organizations realize the need to modernize their security model.Historically,...

read more
How Does Email Archiving Work?

How Does Email Archiving Work?

How Does Email Archiving Work?Source: Intermedia.com Email is likely a critical communication channel for your business, both internally and externally. However, you may have concerns about security, accessibility, and storage. The best solution to address all of...

read more
Drop us a line anytime and one of our team members will be happy to help you
Subscribe To Our Newsletter
Subscribe To Our NewsletterJoin our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!

Pin It on Pinterest

Share This