Search the blog:
For many organisations, Office 365 is their first foray into the world of cloud. That brings unique advantages – but unique challenges too. In this article, the Grant McGregor team talks you through the essentials of Office 365 security.
The new year was barely hours old, when news started leaking about a troubling new data breach – the result of a ransomware attack on a major currency exchange business. Holiday makers, foreign exchange offices and airport currency services were all thrown into disarray in the first few days of the...
Since its launch in November 2018, Scottish Enterprise’s voucher scheme has helped hundreds of Scottish businesses achieve the valuable, Government-backed Cyber Essentials Certificate. The vouchers are essentially grants of up to £1,000 that allows organisations get expert assistance, tailored...
Cyber security is a complex topic, so it is essential to get expert help. As a result, and particularly for SMEs, it is better to find an experienced IT partner than to try to do it all in house.
Concern over cyber threats has hit an all-time high, with a recent global cyber risk perception survey finding that 79% of organisations now rank cyber risk as a top-five concern.
Software updates (or patching) is familiar to us all. We’ll update the apps on our mobile phones with some regularity and the same should apply to all the software applications we use on all devices we use. Unfortunately, we find that many businesses are still using out of date or older versions of...
Email poses perhaps the greatest risk for organisations in terms of cyber security.
It's not long now until our Cyber Essentials event on Thursday 26th September and the places are filling up quick! Click the link at the bottom of this blog to register now and ensure your place.
Phishing is the most pernicious type of cyber-attack. While you can stop some phishing attempts with your security tools, it’s almost inevitable that some will reach their intended targets. This means educating your people has to be a key plank in any phishing defence strategy.