10 essential layers of ransomware defence
A strategy consisting of layers to protect the organisation on multiple fronts is essential for ransomware defence.
Proact’s reaction to the Log4j vulnerability

The Log4j attack affected millions of systems in late 2021. Here, we discuss how Proact reacted to protect our customers and ourselves.
Five steps toward a united front against ransomware

Read our blog to find out five essential steps your organisation can take to put up a united front against ransomware.
A digital future for the NHS

The need for digital transformation within the NHS has accelerated over the last couple of years. So, what does the future hold as NHS organisations embrace digital change?
Accept the challenge: Ingeborg Lagendijk, Adoption Consultant

This is the third article in our Women in Tech series, featuring stories from women at Proact about their experiences in the IT industry. Check out our first and second articles as well. Were you exposed to technical topics during your schooling? No. I actually never received any sort of technical training – or really […]
Skills matter, gender doesn’t: Lisa Hengelein, Manager MCS Operations

This is article two of three in our Women in Tech series, featuring stories from women at Proact about their experiences in the IT industry. Check out our first article in the series here. When did you join Proact, and what is your role? I have been with Proact Deutschland GmbH since July 2019. My […]
Her journey to tech: Esther van der Molen, Application Engineer

Rob Sims, Head of Workspace, dives into the true experience of hybrid working and shares the three core concepts to ensure you’re offering your employees the best experience.
Cybercriminals and software: a means to a malicious end

Find out how cybercriminals have evolved their tactics to exploit software vulnerabilities, even the biggest vendors struggle to keep up.
3 ways to keep your end-users secure

Read our blog to find out three core areas you should consider to develop a security practice that is built into the workspace architecture.
Why don’t we monitor end-user experience?

Let’s explore what Digital Experience Monitoring (DEM) is and why we should be taking note.