Latest from our business, security
and technology blog

Search the blog:

    2017-06-19 10:56:25

    The Rise of Personally-Targeted Spear-Phishing Attacks & How to Defend Yourself From Them...

    As we all become more wary about the tell-tale signs of a phishing email attack, criminals are turning to a more targeted approach to email scamming: the spear-phishing attack.

    2017-06-12 09:30:34

    Your IT perimeter: where is it and how do you best defend it?

    Gone are the days when the limits of your security cordon were the walls of the datacentre. Now, it isn’t the stray floppy disk or errant memory stick we need to worry about – many of us are wondering where the limits of our IT perimeter are.

    2017-06-05 11:03:21

    Is the Password Still Relevant to Control Identity and Access to Your IT Systems and Data?

    A lot of people believe that the password is an invention of the age of computing, a necessary part of securing IT systems from hackers and other malevolent forces – intentional or unintentional. In truth, the password is about as old as human civilisation.

    2017-05-22 09:24:36

    Is Your Disaster Recovery Plan & Process Up to Scratch?

    In recent years, the IT landscape has been transformed by digitalisation, Cloud, social and mobile – probably with significant impact on what a business-critical system looks like and what constitutes an IT disaster for your business.

    2017-05-15 10:11:32

    How to Protect Your Business Against Cyber-Attacks and Data Theft

    Wow! Quite a weekend of news around Cyber Security... This was an article we had written a couple of weeks ago now and had scheduled for publication today just for the sake of offering our readers and supported end-users ongoing education about cyber security and playing your part...

    2017-05-08 08:30:18

    3 Ways a Small & Medium Business (SMB) Can Benefit From YouTube Content Marketing

    In today’s market, it can be very difficult for SMBs to stand out.

    2017-05-01 07:30:32

    5 Top Tips for Handling Confidential Information in Your Business

    When handling confidential information in your business, whether it's relating to your customers or employees, you have a duty to take the necessary steps to protect it. Failure to ensure that data is properly protected and in accordance with the law can lead to lawsuits as well as damage to your...

    2017-04-24 08:14:33

    Support for Windows Vista Comes To An End

    On April 11th 2017, Microsoft officially ended support for Vista, meaning they will no longer be releasing security updates, patches or technical support for it. Therefore if your business computers are still running Windows Vista then now is the time to upgrade to a more recent version.

    2017-04-17 07:30:29

    Is Antivirus Still Relevant in a World of Increasing Cyber-Attacks?

    Recently we looked at how Ransomware is on the rise: Cyber Security Experts Warn of Rise in Ransomware