Search the blog:
Leasing your IT equipment can be a great way to refresh your hardware estate without grappling with huge capital expenditure. But did you know that it can also help you meet your sustainability goals?
With companies storing an increasing amount of sensitive information, it's crucial that we take proactive measures to protect that data. One method to protect data is to encrypt it, so that it is undecipherable to anyone who does not have the encryption key.
A recent survey by Gigamon found that half of respondents didn’t know where their organisation’s most sensitive data is stored – or how it is secured. Could you determine where your most valuable data is and how it is protected?
One of the biggest miscarriages of justice in British legal history was driven by a faulty computer programme. Made worse by the supplier and procurer of the system refusing to accept that it was at fault, the scandal has finally got the recognition it deserves following an ITV drama about the...
Is your business using DrayTek routers? With some unsupported models still widely used, it is important to act now to replace them. Unfortunately, cyber-attackers are targeting the devices – meaning the threat is real and immediate.
According to IBM Security’s Cost of a Data Breach Report for 2022, 83 per cent of organisations have experienced more than one data breach. Unfortunately, as with so many cyber-security threats, the likelihood of your organisation suffering a data breach is a question of “when” not “if”.
Incident response, incident response planning and the nurturing of a positive incident reporting culture within your organisation are all critical aspects of cyber security. This blog focuses on why you need to develop an incident reporting culture and how to do it.
Microsoft’s support for Windows Server 2012 ended in October 2023. That means it is vitally important to take action now to protect the cybersecurity stance of your business.
Earlier this month, Leicester City Council became the latest in a long line of local authorities who have suffered a cyber breach. What can we learn from this latest attack?