Latest from our business, security
and technology blog

Search the blog:

    2018-11-12 07:30:19

    Staff Training: Your First Line of Defence in IT Security

    Staff training has a key role to play in any cyber security and information management strategy. So how do you begin to plan what needs to be done?

    2018-11-07 09:00:39

    Cyber Essentials Voucher Scheme worth up to £1000 launched in Scotland

    The Scottish Government has made funding available for a new voucher scheme to help Scottish businesses and charities achieve the National Cyber Security Centre's (NCSC) Cyber Essentials certification.

    2018-11-05 07:30:22

    Why You Should be Using 2 Factor Authentication Right Now!

    Verizon’s 2017 Data Breach Investigations Report found that 81% of of hacking-related breaches leveraged either stolen and/or weak passwords.

    2018-10-29 15:33:58

    The FBI Warns of a New Cyber Security Threat

    Most cyber security news recently has focused on the revelation of Russian military intelligence service attacks, but there has been a recent announcement about cyber security practice to which organisations of all sizes including small businesses should be paying much greater attention.

    2018-10-25 09:53:45

    Computer Hardware Basics: What To Buy and Why it’s Important

    We often get asked by our customers what sort of PC or laptop hardware to buy. Or what specification is right. Whether you're very tech-savvy and know your PC components inside out, or you haven't the foggiest what type of processor or hard-drive is best, it can be hard to decipher the technical...

    2018-10-17 08:13:15

    How does an Information Asset Register ensure GDPR compliance?

    GDPR has focused business leaders’ thoughts on the data held within their organisations and how best to protect it. Since the first step towards securing anything is understanding what you have, an Information Asset Register is crucial. Grant McGregor explains what an Information Asset Register is...

    2018-10-08 07:30:01

    Everyone Begins Cyber Essentials from a Different Starting Point

    Everyone begins their Cyber Essentials certification process from a different starting point – but that’s what makes the scheme so important.

    2018-10-01 07:30:57

    Weighing in on Microsoft’s New Office 365 Subscription Model

    2018-09-25 11:46:21

    How to ensure the success of your disaster recovery and business continuity plans

    The disaster recovery and business continuity expectations of senior business leaders are changing – how can IT managers respond to ensure the success of their disaster recovery and business continuity plans?