Latest from our business, security
and technology blog

Search the blog:

    2017-07-17 07:30:50

    The 7-Step Plan for Small Businesses for Essential Cyber Security

    We discussed in an earlier blog how 80% of cyber-attacks could be prevented, simply by putting simple cyber security controls in place.

    2017-07-03 07:30:27

    You’re Not Too Small to Be a Victim: The Obvious IT Security Fails Small Businesses Can Avoid

    2017-06-19 10:56:25

    The Rise of Personally-Targeted Spear-Phishing Attacks & How to Defend Yourself From Them...

    As we all become more wary about the tell-tale signs of a phishing email attack, criminals are turning to a more targeted approach to email scamming: the spear-phishing attack.

    2017-06-12 09:30:34

    Your IT perimeter: where is it and how do you best defend it?

    Gone are the days when the limits of your security cordon were the walls of the datacentre. Now, it isn’t the stray floppy disk or errant memory stick we need to worry about – many of us are wondering where the limits of our IT perimeter are.

    2017-05-22 09:24:36

    Is Your Disaster Recovery Plan & Process Up to Scratch?

    In recent years, the IT landscape has been transformed by digitalisation, Cloud, social and mobile – probably with significant impact on what a business-critical system looks like and what constitutes an IT disaster for your business.

    2017-05-15 10:11:32

    How to Protect Your Business Against Cyber-Attacks and Data Theft

    Wow! Quite a weekend of news around Cyber Security... This was an article we had written a couple of weeks ago now and had scheduled for publication today just for the sake of offering our readers and supported end-users ongoing education about cyber security and playing your part...

    2017-03-27 10:55:54

    Cyber Security Experts Warn of Rise in Ransomware

    A joint report from the NCA and the NCSC warns that cybercrime is becoming more aggressive. The increase in devices connecting to the internet is providing more opportunities for criminals to hold people to ransom over personal data.

    2017-01-30 08:30:12

    How to Combat the ‘Insider Threat’

    Many businesses consider cyber threats as external forces, attempting to penetrate their defences from the outside in. In truth, however, threats often originate from within.

    2017-01-11 16:38:05

    Learning the lessons of 2016: How SMEs can improve their cyber security practices this year

    This time last year, we were contemplating 2015 as the year of the data breach. We were taking stock and trying to learn the lessons so that we could better protect ourselves and our businesses from the growing threat of hackers. And then 2016 happened.