Latest from our business, security
and technology blog

Search the blog:

    endpoints
    2021-07-26 11:42:28

    Are your devices managed and secured to meet today’s evolving threats?

    We know that criminal cyber activity has increased since the beginning of the pandemic. Cyber criminals moved quickly to target the new vulnerabilities of our rapidly altered working arrangements. To meet these threats, the security and management of devices has become critical. Endpoint management...

    remote workers connecting
    2021-04-12 07:30:00

    What Are the COVID-19 Keepers? Four of 2020’s Changes We Plan to Continue

    As we pass the year anniversary of the first lockdown, Grant McGregor asks: what are the COVID keepers? A lot has changed in the world of IT over the last twelve to eighteen months. The changes we’ve made to enable our organisations to respond to the COVID-19 pandemic have been far-reaching. And...

    2020-08-10 07:30:00

    How to ensure web applications used in your business are secure

    What are you doing to secure your business website and other web applications used in your business? If you run local browser (web) applications, they are probably secured with a variety of techniques, including firewalls, regular patching and network monitoring. But what happens when you are...

    2020-02-24 08:30:00

    The Importance of Online Backup for SMEs

    The single best change you can make to your IT systems and processes this year? Investing in a suitable and effective backup solution for your business. If there is one thing we all learnt from the Travelex ransomware story in January, it’s that even some of world’s biggest organisations, dealing...

    2019-06-11 09:12:23

    Are Your Websites and Applications Secure?

    What are you doing to secure your business website and other web applications used in your business? If you run local browser (web) applications, they are probably secured with a variety of techniques, including firewalls, regular patching and network monitoring. But what happens when you are...

    2019-05-27 12:37:47

    How to Address the Dangers of Personal Devices for Work

    What happens when an employee downloads a virus onto one of their personal devices that you have allowed access your company systems? Grant McGregor takes a look at an emerging weak spot in many companies’ defences.

    2018-06-25 12:30:33

    Don’t Rely on Ethics: Protecting Your Company When You Need to Let Someone Go

    When it comes down to it, letting an employee go is never pleasant. Anger, confusion and even tears are all possibilities if the process isn’t well organised, professionally executed, and respectful to everyone involved.

    2018-04-23 07:30:05

    How Mobilisation Can Help Empower Your Employees

    The traditional employment model of jobs for life and a 9-5, Mon-Fri has undergone a major shake-up over the last couple of decades.

    2018-02-26 09:42:01

    5 Things Every BYOD Policy Needs

    Bring Your Own Device (BYOD) policies are rapidly gaining traction in the modern workplace owing to the flexibility and convenience they provide to both employees and their employers.

    1 2