Search the blog:
We all want to do our best to keep our corporate data and systems safe. Each year, organisations invest millions in firewalls, anti-virus software, training and patching programmes. But how much of this is directed at mobile devices?
Developing an IT strategy can be a daunting task to start, especially if you’ve not done it before. Our new guide helps to demystify the process and offers a five-step approach to help you to get it done.
It’s tempting to see the UK Government’s new Cyber Essentials scheme as not worthy of investigation if you’re an established organisation with good IT systems in place. But our experience as an IASME Certification Body has taught us that this isn’t always the case.
With more people than ever poised to partake in this year’s November shopping frenzy, attackers will capitalise on shoppers seeking to get great deals.
The Scottish Government has made funding available for a new voucher scheme to help Scottish businesses and charities achieve the National Cyber Security Centre's (NCSC) Cyber Essentials certification.
GDPR has focused business leaders’ thoughts on the data held within their organisations and how best to protect it. Since the first step towards securing anything is understanding what you have, an Information Asset Register is crucial. Grant McGregor explains what an Information Asset Register is...
Everyone begins their Cyber Essentials certification process from a different starting point – but that’s what makes the scheme so important.
With organisations under more pressure than ever to protect their customers’ data, and more and more information being stored digitally, Grant McGregor takes a look at encryption and the possibilities it offers to help small businesses protect their data.
When it comes down to it, letting an employee go is never pleasant. Anger, confusion and even tears are all possibilities if the process isn’t well organised, professionally executed, and respectful to everyone involved.