Latest from our business, security
and technology blog

Search the blog:

    2024-05-07 13:25:45

    Should you lease? Dell, sustainability and your leasing options

    Leasing your IT equipment can be a great way to refresh your hardware estate without grappling with huge capital expenditure. But did you know that it can also help you meet your sustainability goals?

    2024-05-02 10:37:29

    The Hidden Danger of Encrypted Traffic

    With companies storing an increasing amount of sensitive information, it's crucial that we take proactive measures to protect that data. One method to protect data is to encrypt it, so that it is undecipherable to anyone who does not have the encryption key.

    2024-04-24 14:31:30

    Do you know which data your organisation needs to secure?

    A recent survey by Gigamon found that half of respondents didn’t know where their organisation’s most sensitive data is stored – or how it is secured. Could you determine where your most valuable data is and how it is protected?

    2024-04-17 09:12:45

    What can we learn from the Post Office Horizon scandal about how to choose an IT partner?

    One of the biggest miscarriages of justice in British legal history was driven by a faulty computer programme. Made worse by the supplier and procurer of the system refusing to accept that it was at fault, the scandal has finally got the recognition it deserves following an ITV drama about the...

    2024-04-16 16:02:14

    DrayTeks end of life! And why you need Next Gen Firewalls

    Is your business using DrayTek routers? With some unsupported models still widely used, it is important to act now to replace them. Unfortunately, cyber-attackers are targeting the devices – meaning the threat is real and immediate.

    2024-04-09 15:31:43

    How long would it take your organisation to detect a data breach?

    According to IBM Security’s Cost of a Data Breach Report for 2022, 83 per cent of organisations have experienced more than one data breach. Unfortunately, as with so many cyber-security threats, the likelihood of your organisation suffering a data breach is a question of “when” not “if”.

    2024-04-05 11:15:00

    How to Develop an Incident Reporting Culture

    Incident response, incident response planning and the nurturing of a positive incident reporting culture within your organisation are all critical aspects of cyber security. This blog focuses on why you need to develop an incident reporting culture and how to do it.

    2024-03-27 13:00:20

    Server 2012 is end of life: Act now!

    Microsoft’s support for Windows Server 2012 ended in October 2023. That means it is vitally important to take action now to protect the cybersecurity stance of your business.

    2024-03-19 15:27:19

    Learning from Leicester: Cyber-attack causes disruption for council

    Earlier this month, Leicester City Council became the latest in a long line of local authorities who have suffered a cyber breach. What can we learn from this latest attack?

    2 3 4 5 6