Latest from our business, security
and technology blog

Search the blog:

  • There are no suggestions because the search field is empty.
2018-02-12 07:30:27

Could Social Media Be Your Security Weak Spot?

Social Media is so much a part of our lives these days, both personally and in business.

2018-02-07 14:17:47

6 Things You Can Do This Year to Boost Your IT Performance in 2018

We take a look at six simple things you can do this year to boost IT performance and productivity in 2018.

2018-01-29 12:46:27

Why the Carphone Warehouse Data Breach Offers Lessons to us All...

Carphone Warehouse has just been fined £400,000 by the UK Information Commissioner’s Office (ICO) as a result of a 2015 data breach.

2018-01-16 15:18:08

The Two New IT Vulnerabilities that Affect Nearly Everyone

You’ve probably heard of Spectre and Meltdown by now – the two new vulnerabilities that researchers have identified as affecting chips from Intel, AMD and ARM. We take a look at the risk they pose and what you should be doing about them.

2018-01-08 08:30:15

Supporting Work Life Balance Through Technology

Organisations in the UK have a legal obligation to consider employee requests to work flexibly.

2018-01-01 09:47:27

New Year... New IT Partner?

Technology isn’t the starting point for many small businesses and start-ups – unless technology is your business.

2017-12-18 15:08:35

Should You Be Using Microsoft Teams?

Office 365 offers huge benefits to SMBs in terms of simplifying and saving on essential IT services. However, in many businesses, it isn’t being used to its full potential.

2017-11-27 07:30:17

Protect your Business, your Clients and your Supply Chain with the UK Government's Cyber Essentials Security Standard

2017-11-13 07:30:35

Strategies for Surviving a Cyber Attack

Another month, another high-profile attack… or so it seems at the moment. The latest in the long line was US data firm Equifax – with a breach that affected more than 143 million American consumers. Even if you aren’t holding that much customer data, how do you recover from a breach like that?