Latest from our business, security
and technology blog

Search the blog:

    2023-09-04 15:20:00

    Tips for successfully implementing a zero-trust approach to cyber security

    As increasing numbers of businesses have moved to a cloud environment and remote working models, Zero Trust has gained a place in the everyday cyber security approaches of many organisations.

    2022-03-10 10:58:16

    What Does the War in Ukraine Mean for Your Cyber Security?

    Hackers have been active on both sides in the conflict between Russian and Ukraine. The Grant McGregor team asks: should you be worried? Could your IT systems be caught in the crossfire in the cyberwar? And how can you protect your IT systems? We’ve all been shocked by the terrible events unfolding...

    2019-08-06 15:40:40

    What Can We Learn from the Eurofins Ransomware Case?

    The largest private forensics provider in the UK has paid a ransom to hackers after its IT systems were compromised by a cyber-attack. Is this the new normal? And what can businesses learn from the Eurofins experience?

    2019-07-30 08:28:18

    The New Rules for Passwords in 2019

    Access control is fundamental to security – whether in your home, your office or your IT infrastructure. If passwords are the keys that open the doors to your IT estate for legitimate users, how do you stop them falling into the possession of malicious actors?

    gazelles running in the bush
    2019-05-06 07:30:53

    Not Faster than the Lion

    Cyber threats are constantly evolving and growing. With breaches reported in the international press, it is easy to get lost in the white noise of cybercrime fear and misinformation. But there are some truly straightforward and clear steps that every business can take.

    2016-04-04 09:00:16

    The Three Most Common Access Control Issues

    Security is a huge issue for SMBs. Keeping your data secure is essential, especially when you’re collecting customer data that’s highly sensitive. The best way to keep data secure when it’s being stored remotely is through access control measures using authentication.

    1