The Facebook and Cambridge Analytica data scandal had most of us glued to the news for weeks when the misuse of data was publicised last year. Read more
Let's assume you are the victim of a cyber attack and your IT environment is rendered useless, what's your plan to recover from this disaster? Backup... Read more
At a squint, you’d be forgiven for thinking RTO and RPO are related to a certain robotic duo from the Star Wars saga. Unfortunately — or fortunately,... Read more
2019 is a year for getting ahead and being more efficient with resources and money, so it’s important to focus your IT spend on areas that are going... Read more
There’s no doubt that cybercrime is big business, with a recent study by Dr. Michael McGuire revealing that cybercrime revenues total an estimated... Read more
Digital espionage, or cyber espionage as it’s often known, sounds like something out of a James Bond movie, doesn’t it? Unfortunately, it’s a common... Read more
Zero-day vulnerability is a vulnerability that was left without a fix by the developer and was newly disclosed to the public or the outside world.... Read more
Whether it’s a cyberattack, hardware failure, or an act of nature, your IT systems might be unexpectedly crippled at any moment. In the past, to... Read more
For most businesses, the answer is yes. The ease of deployment, ability to scale as your needs change and automatic updates make cloud managed... Read more
Many CTOs are kept awake at night by the thought of a crippling IT disaster, and it’s not surprising considering the financial impact they have. In... Read more
Here at The Missing Link, we’re seeing that there is increasing pressure for IT teams to provide better service on a smaller budget. Read more