Search the blog:
The traditional employment model of jobs for life and a 9-5, Mon-Fri has undergone a major shake-up over the last couple of decades.
Where are the end points on your network?
As we approach closer to the GDPR deadline, we've been getting a lot of questions regarding whether business email addresses and contact details will come under the GDPR as 'personal data'. We have been waiting on a guide to fully explain this, and last week IASME - Certifying Body for Cyber...
The life of an IT manager can often feel like a thankless task. Staying on top of daily and weekly tasks can be difficult when problems and projects shift your focus away from basic housekeeping.
Since it landed in 2015, the GDPR is a big leap in data protection legislation and with the ruling applicable across the whole of Europe, we are finally bridging the gap between our digital identities and the law.
We’ve all heard some horror stories: the divorce lawyers trawling your social media accounts, the gift for any would-be stalker that is your Facebook Timeline – but what happens when the dangers of oversharing online cross into the professional realm?
Passwords have an important role to play in any organisation’s cyber security – whether to protect user access to applications, data or email. So what should organisations be doing to ensure that the passwords and password policies being used are up to scratch?
Bring Your Own Device (BYOD) policies are rapidly gaining traction in the modern workplace owing to the flexibility and convenience they provide to both employees and their employers.