The VMware vCenter Converter is back in a beta version

You will be happy to know that the Converter is now available in beta! This version is mostly focused on improving the stability and security standards of the Converter and keeping the existing functionality and user-experience. “vCenter Converter is a freeware standalone tool providing the possibility to convert virtual workloads running on third-party hypervisors and


Comment Convertir à P2V sans vCenter Converter?

Comme vous le savez probablement, VMware a rendu le produit vCenter Converter indisponible pour des raisons de sécurité et de stabilité. Pour l’instant, nous pouvons toujours le télécharger ici et là grâce à l’hébergement de fichiers et les services de téléchargement. En revanche, ceci n’est pas une solution des plus sécuritaire. Sur le blog de


5 Exciting Ways Microsoft 365 Can Enable the Hybrid Office

“Hybrid office” is the new buzzword you’ll hear used in business discussions. It’s the mix of having employees both working at the office and working from home. This has become more than a buzzword and is now the reality for many companies. There was a survey of employees with remote-capable jobs. The survey found that


How Using the SLAM Method Can Improve Phishing Detection

There is a reason why phishing is usually at the top of the list for security awareness training. For the last decade or two, it has been the main delivery method for all types of attacks. Ransomware, credential theft, database breaches, and more launch via a phishing email. Why has phishing remained such a large


Sensibilisons nos employés à la cybersécurité grâce à la formation!

Vous avez terminé votre formation annuelle sur le phishing. Cela comprend la formation des employés à la détection des e-mails de phishing. Vous vous en sentez bien. C’est jusqu’à environ 5-6 mois plus tard. Votre entreprise est victime d’une coûteuse infection par un rançongiciel en raison d’un clic sur un lien de phishing. Vous vous


How Often Do You Need to Train Employees on Cybersecurity Awareness?

You’ve completed your annual phishing training. This includes teaching employees how to spot phishing emails. You’re feeling good about it. That is until about 5-6 months later. Your company suffers a costly ransomware infection due to a click on a phishing link. You wonder why you seem to need to train on the same information


Home Security: Why You Should Put IoT Devices on a Guest Wi-Fi Network

The number of internet-connected devices in homes has been growing. It’s increased exponentially over the last decade. A typical home now has 10.37 devices connected to the internet. PCs and mobile devices make up a little over half of those and the rest are IoT devices (Not standard computing devices) IoT stands for Internet of

Scroll to top