Unveiling Shadow IT: Understanding the Risks

Working with a personal device, storing work files on cloud storage solutions which are not established by the company, meeting on different platforms than the ones specified,… These are all examples of a problem known as shadow IT. This problem refers to any hardware, software, application or IT service used on a company network without […]

Effective license management: a key to saving money and optimizing resources

Companies heavily rely on a wide array of software applications to streamline operations, enhance productivity, and deliver better services to their customers. However, this increased dependency on software comes at a cost – the ever-mounting expense of licenses. Effective license management is a crucial strategy for organizations to control costs and optimize resources. In this […]

Microsoft’s 365 E5 Security License: Making the Most of Defender

If you’re a cybersecurity decision-maker, the Microsoft 365 E5 Security license offers you great opportunities to stretch your budget while optimizing your cyber defenses.  But the Defender functionality bundled into your E5 license is just one piece of your overall cyberdefense strategy. To make the most of that bundled functionality, you must still:  Fully leverage […]

Strengthening Active Directory Security

In the realm of cybersecurity, organizations must prioritize safeguarding their critical systems and sensitive data. Active Directory (AD), a vital component of IT infrastructure, often becomes a primary target for threat actors seeking unauthorized access. It’s also an easy target most of the time, because in a lot of companies the AD has been installed […]

Strengthening Cloud Migration Security Posture with MXDR

As businesses increasingly embrace cloud computing for its scalability, agility, and cost-efficiency, ensuring robust security during the cloud migration process is essential. Organizations need to protect their data, applications, and infrastructure from evolving cyber threats. In this blog post, we will explore how Managed Extended Detection and Response (MXDR) can enhance the security posture of […]

Enhancing Cybersecurity Compliance with MXDR and the NIS2 Directive

Purpose & challenges of NIS2  The NIS2 directive is designed to ensure the security of critical infrastructures and digital service providers across the EU. Its primary objectives are to enhance the resilience of essential services against cyber threats, improve incident response capabilities, and foster cooperation and information-sharing between Member States. Compliance with the NIS2 directive […]

Dilaco and Secureworks: partnering for robust cyber defence

Delivering the best in cyber security The importance of robust cybersecurity cannot be overstated in our constantly evolving digital world. Dilaco and Secureworks have worked together since July 2021, and now they are collaborating even more closely to deliver the best cyber defence for clients. When Wim Kretzers, currently CEO, started as a Head of […]

Liquit and Dilaco joining forces to improve application management

Martijn Gevers, Country Manager of Dilaco NL

January 2023 marked the formalization of a partnership between Liquit, the developer of a unique application management platform, and Dilaco NL, an IT and service provider that focusses predominantly on application management.   In order to ensure the effectiveness and efficiency of software applications, good application management is vital for every organization. Gevers, Country Manager […]

Dilaco puts on a new jacket

IT provider, Dilaco, chooses a new look and a new approach after its 24 years of existence in the IT world. “Not only do we need to keep up to date with the latest technological possibilities, but we also need to modernise our image to the outside world in a timely manner,” says Christophe De […]