Latest from our business, security
and technology blog

Search the blog:

    2017-08-14 07:30:40

    Comparing the Advantages with the Pitfalls of BYOD

    Research from Gartner has shown that 39% of employees surveyed rely on personally owned mobile devices in the workplace. Use of corporate owned devices was minor in comparison – just 10%. There are of course obvious reasons for the decline of corporate devices – primarily being the high cost burden...

    2017-08-07 07:30:02

    How Technology Can Help You Grow Your Business

    Technology is about innovation and innovation in business is all about doing things differently in order to provide better products and solutions, and an improved service to customers.

    2017-07-31 08:31:01

    We support campaign tackling employment barriers for disabled people

    Grant McGregor was featured in Friday 21st July's edition of the Edinburgh Evening News, regarding the Scottish Government's campaign to encourage businesses to recognise the benefits of employing people with disabilities.

    2017-07-25 11:29:39

    What is the "right" level of security for my business?

    So far, 2017 has been the year of the cyber-attack. Cases of cyber-crime and cyber-terrorism are on the rise, but never before have the general public seen the scope and scale of cyber-crime committed by groups on the government and public services.

    2017-07-17 07:30:50

    The 7-Step Plan for Small Businesses for Essential Cyber Security

    We discussed in an earlier blog how 80% of cyber-attacks could be prevented, simply by putting simple cyber security controls in place.

    2017-07-10 09:25:27

    An Introduction to GDPR: Give Data Proper Respect!

    The General Data Protection Regulation (GDPR) is getting a lot of column space, yet many businesses still have their head in the sand when it comes to its implications. We bust some myths and tell you what you need to know.

    2017-07-03 07:30:27

    You’re Not Too Small to Be a Victim: The Obvious IT Security Fails Small Businesses Can Avoid

    2017-06-19 10:56:25

    The Rise of Personally-Targeted Spear-Phishing Attacks & How to Defend Yourself From Them...

    As we all become more wary about the tell-tale signs of a phishing email attack, criminals are turning to a more targeted approach to email scamming: the spear-phishing attack.

    2017-06-12 09:30:34

    Your IT perimeter: where is it and how do you best defend it?

    Gone are the days when the limits of your security cordon were the walls of the datacentre. Now, it isn’t the stray floppy disk or errant memory stick we need to worry about – many of us are wondering where the limits of our IT perimeter are.