Latest from our business, security
and technology blog

Search the blog:

    2018-01-29 12:46:27

    Why the Carphone Warehouse Data Breach Offers Lessons to us All...

    Carphone Warehouse has just been fined £400,000 by the UK Information Commissioner’s Office (ICO) as a result of a 2015 data breach.

    2018-01-16 15:18:08

    The Two New IT Vulnerabilities that Affect Nearly Everyone

    You’ve probably heard of Spectre and Meltdown by now – the two new vulnerabilities that researchers have identified as affecting chips from Intel, AMD and ARM. We take a look at the risk they pose and what you should be doing about them.

    2018-01-08 08:30:15

    Supporting Work Life Balance Through Technology

    Organisations in the UK have a legal obligation to consider employee requests to work flexibly.

    2018-01-01 09:47:27

    New Year... New IT Partner?

    Technology isn’t the starting point for many small businesses and start-ups – unless technology is your business.

    2017-12-18 15:08:35

    Should You Be Using Microsoft Teams?

    Office 365 offers huge benefits to SMBs in terms of simplifying and saving on essential IT services. However, in many businesses, it isn’t being used to its full potential.

    2017-11-27 07:30:17

    Protect your Business, your Clients and your Supply Chain with the UK Government's Cyber Essentials Security Standard

    2017-11-13 07:30:35

    Strategies for Surviving a Cyber Attack

    Another month, another high-profile attack… or so it seems at the moment. The latest in the long line was US data firm Equifax – with a breach that affected more than 143 million American consumers. Even if you aren’t holding that much customer data, how do you recover from a breach like that?

    2017-10-23 11:19:35

    The Beginner's Guide to Cloud Security

    As increasing numbers of businesses shift their workloads to the cloud, the security threat we face is changing. Where our data goes, the hackers follow – and now cloud attacks are on the rise.

    2017-10-16 09:35:51

    Protect Your Business from Insider Attacks

    When we discuss cyber-attacks it often refers to those that come from the outside – the ones that are typically high profiles cases, such as malware, hacking, DDOS and ransomware.