Search the blog:
The traditional employment model of jobs for life and a 9-5, Mon-Fri has undergone a major shake-up over the last couple of decades.
Where are the end points on your network?
If you think that installing Anti-virus software on your office computer is going to protect you from the latest generation of malware, think again. Every day, with over 230,000 new malware threats created and released online, we have watched the evolution of these programmes, from primitive...
As we approach closer to the GDPR deadline, we've been getting a lot of questions regarding whether business email addresses and contact details will come under the GDPR as 'personal data'. We have been waiting on a guide to fully explain this, and last week IASME - Certifying Body for Cyber...
The life of an IT manager can often feel like a thankless task. Staying on top of daily and weekly tasks can be difficult when problems and projects shift your focus away from basic housekeeping.
Since it landed in 2015, the GDPR is a big leap in data protection legislation and with the ruling applicable across the whole of Europe, we are finally bridging the gap between our digital identities and the law.
We’ve all heard some horror stories: the divorce lawyers trawling your social media accounts, the gift for any would-be stalker that is your Facebook Timeline – but what happens when the dangers of oversharing online cross into the professional realm?
Passwords have an important role to play in any organisation’s cyber security – whether to protect user access to applications, data or email. So what should organisations be doing to ensure that the passwords and password policies being used are up to scratch?
One of the biggest business disruptions is unplanned employee absence. During winter there is always a high probability of bad weather and there are plenty of colds and illnesses going round, resulting in many businesses advising employees to stay at home rather than share their germs with the rest...