Latest from our business, security
and technology blog

Search the blog:

    2021-10-25 09:33:23

    Should cyber risk be the responsibility of your Risk Manager or your IT Manager?

    Today, IT systems are crucial to the day-to-day operations of many organisations. This makes cyber security risks a significant part of organisational risk management. But where should responsibility fall? Is cyber security risk management the preserve of IT or organisational risk managers? Before...

    incident response plan
    2021-10-04 07:30:00

    How to Create an Incident Response Plan

    A few weeks ago, we talked about the need to create an open culture in your organisation; one in which people are actively encouraged to report cyber concerns. In this blog, we revisit the topic and detail how to create an effective incident response plan. Your incident response plan has a...

    GDPR
    2021-09-01 13:41:11

    GDPR: The Essential 2021 Guide

    It’s been a while since GDPR dominated the pages of business magazines and technology websites, but some important changes have happened over the last few months which makes the topic well worth revisiting. There was a time when we really could not have escaped the headlines about GDPR. But after...

    2021-08-19 23:30:00

    How Phishing Got Social

    There’s a new attack vector in town: social media. Social is currently the fastest-growing type of phishing attack. Here’s what you need to know. We’ve covered phishing many times here on the Grant McGregor blog. We think it’s important to do so, because we all need to stay vigilant against the...

    endpoints
    2021-07-26 11:42:28

    Are your devices managed and secured to meet today’s evolving threats?

    We know that criminal cyber activity has increased since the beginning of the pandemic. Cyber criminals moved quickly to target the new vulnerabilities of our rapidly altered working arrangements. To meet these threats, the security and management of devices has become critical. Endpoint management...

    2021-07-14 09:12:03

    IT Pro with MDM

    Have you got a way to monitor the devices that access your data and applications on your network? How do you spot nefarious activity on the network? If you can’t answer either of these questions, this blog is for you. We’ll tell you about a quick, easy and low-fuss way to solve these problems....

    Cyber Essentials logo
    2021-05-10 07:30:00

    New NCSC Research Shows Small Businesses Have Most to Gain from Cyber Essentials Scheme

    Small businesses typically benefit the most from a Cyber Essentials or Cyber Essentials Plus certification, according to new research conducted for the UK’s National Cyber Security Centre. The NCSC commissioned BritainThinks to perform a baseline review of Cyber Essentials to look at how the scheme...

    remote workers connecting
    2021-04-12 07:30:00

    What Are the COVID-19 Keepers? Four of 2020’s Changes We Plan to Continue

    As we pass the year anniversary of the first lockdown, Grant McGregor asks: what are the COVID keepers? A lot has changed in the world of IT over the last twelve to eighteen months. The changes we’ve made to enable our organisations to respond to the COVID-19 pandemic have been far-reaching. And...

    2021 recovery
    2021-04-05 07:30:00

    If 2020 was about responding to COVID-19, what will 2021’s recovery look like?

    2020 was a huge challenge for so many of us in so many different ways. As we approach the end of the latest lockdown and we begin to talk about the reopening of society, what is next for the worlds of work and technology? Last year, most IT managers were tasked with supporting the business in new...

    4 5 6 7 8