Latest from our business, security
and technology blog

Search the blog:

    endpoints
    2021-07-26 11:42:28

    Are your devices managed and secured to meet today’s evolving threats?

    We know that criminal cyber activity has increased since the beginning of the pandemic. Cyber criminals moved quickly to target the new vulnerabilities of our rapidly altered working arrangements. To meet these threats, the security and management of devices has become critical. Endpoint management...

    2021-07-14 09:12:03

    IT Pro with MDM

    Have you got a way to monitor the devices that access your data and applications on your network? How do you spot nefarious activity on the network? If you can’t answer either of these questions, this blog is for you. We’ll tell you about a quick, easy and low-fuss way to solve these problems....

    Cyber Essentials logo
    2021-05-10 07:30:00

    New NCSC Research Shows Small Businesses Have Most to Gain from Cyber Essentials Scheme

    Small businesses typically benefit the most from a Cyber Essentials or Cyber Essentials Plus certification, according to new research conducted for the UK’s National Cyber Security Centre. The NCSC commissioned BritainThinks to perform a baseline review of Cyber Essentials to look at how the scheme...

    remote workers connecting
    2021-04-12 07:30:00

    What Are the COVID-19 Keepers? Four of 2020’s Changes We Plan to Continue

    As we pass the year anniversary of the first lockdown, Grant McGregor asks: what are the COVID keepers? A lot has changed in the world of IT over the last twelve to eighteen months. The changes we’ve made to enable our organisations to respond to the COVID-19 pandemic have been far-reaching. And...

    2021 recovery
    2021-04-05 07:30:00

    If 2020 was about responding to COVID-19, what will 2021’s recovery look like?

    2020 was a huge challenge for so many of us in so many different ways. As we approach the end of the latest lockdown and we begin to talk about the reopening of society, what is next for the worlds of work and technology? Last year, most IT managers were tasked with supporting the business in new...

    phishing email red flag
    2021-03-25 15:30:40

    The 10 phishing red flags you need to know about

    Phishing is the most destructive type of cyber-attack. While you can stop some phishing attempts with your security tools, it’s almost inevitable that some will reach their intended targets. This means educating your people has to be a key plank in any phishing defence strategy.

    2021-02-01 10:00:00

    What is Typosquatting? And What Can You Do to Protect Your Organisation from It?

    A phishing method which relies on “typosquatting” is on the rise. But what is typosquatting? And how can you protect your organisation from it? Typosquatting is nothing new – ever since the early days of the Internet, people have been cashing in on domain names that sound or look like the official...

    2021-01-25 12:28:37

    Working From Home: are your systems still secure?

    Even before the lockdown was announced in March 2020, businesses across the UK were doing what they could to ready their business for the effects of the pandemic. But now that we're in 2021 and a 3rd lockdown for some, have you done enough to make your systems more secure?

    2020-12-14 16:14:12

    12 Security & Compliance Reasons for Switching to Microsoft Teams and Why You Should Do It Now – PART 2

    Last week we shared part one of our blog ‘12 Security & Compliance Reasons for Switching to Microsoft Teams and Why You Should Do It Now’ including the first 6 of 12 reasons and today’s blog looks at the next 6.

    3 4 5 6 7