Latest from our business, security
and technology blog

Search the blog:

    2018-10-25 09:53:45

    Computer Hardware Basics: What To Buy and Why it’s Important

    We often get asked by our customers what sort of PC or laptop hardware to buy. Or what specification is right. Whether you're very tech-savvy and know your PC components inside out, or you haven't the foggiest what type of processor or hard-drive is best, it can be hard to decipher the technical...

    2018-10-17 08:13:15

    How does an Information Asset Register ensure GDPR compliance?

    GDPR has focused business leaders’ thoughts on the data held within their organisations and how best to protect it. Since the first step towards securing anything is understanding what you have, an Information Asset Register is crucial. Grant McGregor explains what an Information Asset Register is...

    2018-10-08 07:30:01

    Everyone Begins Cyber Essentials from a Different Starting Point

    Everyone begins their Cyber Essentials certification process from a different starting point – but that’s what makes the scheme so important.

    2018-10-01 07:30:57

    Weighing in on Microsoft’s New Office 365 Subscription Model

    2018-09-25 11:46:21

    How to ensure the success of your disaster recovery and business continuity plans

    The disaster recovery and business continuity expectations of senior business leaders are changing – how can IT managers respond to ensure the success of their disaster recovery and business continuity plans?

    2018-09-17 07:58:54

    What NOT to do when you lose your mobile device

    We rely so much on our smartphones these days, losing our phone or device (or having it stolen) would seem like a real crisis wouldn't it? So let's walk through what NOT to do, as well as what you should do if you find yourself in this situation.

    2018-09-03 07:30:39

    How Do You Stop a Phishing Attack?

    People are often the weakest link of any security infrastructure. Which means the best line of defence when it comes to preventing phishing attacks or other people-focused exploits is to ensure staff are aware of the risks.

    2018-08-27 10:30:29

    What's the Difference between Disaster Recovery & Business Continuity?

    What do businesses need to know when making plans for disaster recovery and business continuity? We explain the difference between the terms and why there is considerable overlap between the two.

    2018-08-22 10:51:34

    Productivity apps for small businesses

    The app store abounds with apps of all kinds and picking the ones that are right for your business can be a challenge. In this article, we will run through some of the most popular apps to help small businesses improve their productivity.