Datasecurity

1 in 5 companies is moving data to a local provider

1 in 5 companies is moving data to a local provider

  • 5 August 2025
  • Reading time: 4 min

According to the latest data survey by team.blue, the international group that includes Combell, 21% of European businesses, or 1 in 5, are already migrating their data to a local...

Why 72% of European businesses prefer not to store their data in the U.S

Why 72% of European businesses prefer not to store their data in the U.S

  • 24 July 2025
  • Reading time: 5 min

Many European business owners and IT experts are concerned about storing data in the U.S. This is evident from a global study - including Belgian insights - by hosting group...

What is a hyperscaler?

What is a hyperscaler?

  • 10 June 2025
  • Reading time: 7 min

When you store your data in the public cloud, you’re likely relying on hyperscalers. Tech giants like Amazon Web Services (AWS), Microsoft Azure, and Alibaba Cloud offer cloud solutions at...

NIS2: Is your cloud environment ready for it?

NIS2: Is your cloud environment ready for it?

  • 28 April 2025
  • Reading time: 5 min

Do you use cloud solutions in your organization? Then you will be directly or indirectly affected by NIS2. In this blog, you'll discover what the directive means for your cloud...

6 reasons to choose a local cloud provider

6 reasons to choose a local cloud provider

  • 4 April 2025
  • Reading time: 4 min

U.S. President Donald Trump's policies have many European companies shaking in their boots. Is it still safe to store your data with American hyperscalers such as Google Cloud, Microsoft Azure,...

NIS2 and your website: what does the new directive mean for you?

NIS2 and your website: what does the new directive mean for you?

  • 13 March 2025
  • Reading time: 5 min

With the introduction of NIS2, Europe aims to enhance the digital resilience of essential and important entities. Do you own a website? Then you'll certainly want to know how NIS2...

What are SQL injections and how can you prevent such attacks?

What is SQL Injection and how to protect your website?

  • 13 February 2025
  • Reading time: 5 min

SQL Injection (SQLi) is one of the most common and dangerous attack techniques that cybercriminals use to exploit vulnerabilities in websites and databases. This technique allows attackers to inject malicious...

What NIS2 means for strict cybersecurity and how Combell is compliant

  • 24 January 2025
  • Reading time: 4 min

The new European directive NIS2 (Network and Information Systems) introduces stricter requirements for cybersecurity. This directive aims to strengthen the digital resilience of essential and important entities. At Combell, cybersecurity...

What is RDP (Remote Desktop Protocol)?

  • 21 October 2024
  • Reading time: 6 min

Imagine being able to connect to any computer, to use it instantly without having to be near it. How convenient would that not be? The Remote Desktop Protocol makes that possible. Find out all about it!

What is a Secure VPN Connection?

  • 27 September 2024
  • Reading time: 6 min

Anyone who owns their own business these days, undertakes ... spends a lot of hours online on the internet. Although online services make business easier, you need to be more aware than ever of all the privacy and security risks. Want to better secure your internet connections at home and at work? Then use a Virtual Private Network.

Help! My website has been hacked, what now?

“Help! My website has been hacked, what now?”

  • 16 February 2024
  • Reading time: 7 min

Find out what to do if your website has been hacked. Learn how to recover, secure your site and prevent future cyber attacks. Protect your online presence with practical steps and valuable insights.

"Oh no! My email address has been hacked, what should I do?"

“Oh no! My email address has been hacked, what should I do?”

  • 25 January 2024
  • Reading time: 6 min

Find out what to do if your email address has been hacked. Learn about the crucial role of email security. Learn how to detect if your email account has been hacked and discover steps to regain control.