Navigating Microsoft’s 2025 pricing changes

Microsoft has announced new pricing changes that came into effect on the 1st April 2025. While the adjustments aren’t seismic, resellers have been dealing with the impact of these changes.
Proofpoint’s acquisition of Hornetsecurity

Explore the impact of the Proofpoint acquisition of Hornetsecurity on SMBs and MSPs across Europe. Learn why now is the ideal time to review your organisation’s security posture.
Meet The Team: Damien Holmes, System Administrator at Topsec

With nearly two decades at Topsec, Damien Holmes has seen the email security landscape transform. And he’s played a major role in shaping how we respond to those changes.
Why cybersecurity is no longer just the IT team’s job

Cybersecurity isn’t just IT’s job. Every department plays a role in protecting your organisation from modern threats.
Outlook’s new email rules: What high-volume senders must do by May 2025 | Topsec

From May 2025, Outlook will enforce strict SPF, DKIM and DMARC requirements for senders of 5,000+ emails/day. Learn what this means and how Topsec can help protect your email reputation.
The dangers of a data breach: Lessons from the 23andMe collapse

Discover the real impact of a data breach through the collapse of 23andMe. Learn how to protect your business with expert email security tips from Topsec.
Ensuring Business Continuity Amidst Microsoft 365 Outages | Email Continuity Solutions

Discover how email continuity solutions can keep your business running during Microsoft 365 outages. Learn how to prevent disruptions, maintain communication and protect data with Topsec Cloud Solutions.
Important Changes to NCSC’s Mail Check Program

Starting March 24, 2025, the NCSC will discontinue DMARC (Domain-based Message Authentication, Reporting, and Conformance) Aggregate Reporting, DMARC Insights, and related TLS Reporting.
Meet the Team: Nauman Shaikh, Account Executive at Topsec

Nauman, Topsec’s Account Executive and resident history buff, revealed why a human-first approach is essential in cybersecurity.
Post-poisoning: The silent cyber threats lurking in your inbox

Learn more about what post-poisoning is and how cybercriminals are using this new tactic to stay relevant and cause havoc.