Latest from our business, security
and technology blog

Search the blog:

    2022-09-13 15:10:52

    None of your team would fall for this trick… would they?

    Cyber criminals have a reputation for constantly coming up with new ways to scam us into handing over login details or sensitive data. And while you might think your team would spot an attempted attack, you could be surprised. We’ve seen a lot of intelligent people – including many business leaders...

    office technology investment
    2021-02-22 12:36:36

    What is the roadmap for technology investment in 2021 and beyond?

    Technology spending through 2020 held strong, despite the pandemic – largely driven by the sudden shift to remote working. But what are the major trends that are going to shake up IT in 2021? Few people could have predicted the events of last year. And few – if any – a traditional business...

    2021-02-08 10:18:00

    The State of Email Security Update

    At the end of last year, security company Mimecast released the latest version of its annual state of email security report – and it revealed some worrying findings. What should organisations be doing to protect themselves from the current attack vectors? In this year’s report(1), Mimecast...

    remote worker connecting with colleagues on Microsoft Teams
    2020-11-09 09:29:00

    The Role of COVID-19 in Fast-Tracking Digital Transformation

    COVID-19 has brought many changes with it – including the fast tracking of digital transformation for many businesses and organisations. It’s hard to look for positives in the pandemic, when so many people have been so affected by it. However, it has served to reveal to us the ingenuity and...

    face masks in office
    2020-07-20 07:00:00

    What does “back to work” mean for your business continuity planning?

    Organisations must revisit their operational strategies and business continuity planning in the wake of the COVID-19 pandemic. Here, the Grant McGregor team considers what this might mean for your business continuity planning and, especially, IT. In a recent blog, we looked at how the current...

    2020-03-06 12:58:08

    Why You Should be Using 2 Factor Authentication Right Now!

    According to the Verizon 2019 Data Breach Investigations Report, 62% of breaches not involving an Error, Misuse, or Physical action (in other words, wounds that weren’t self-inflicted) involved the use of stolen credentials, brute force, or phishing.

    2019-11-19 09:24:16

    Are you doing enough to protect your staff against Phishing?

    In IT, we talk a lot about protecting our systems and data against cyber-attack. However, there is a growing realisation that this is only part of the picture. We need to do much more to protect our people too.

    2019-06-04 11:00:10

    From Spam to Phish – Cyber Crime on a Plate

    Email – love or hate it as a form of communication, it touches most of us everyday and shows no signs of going away. This is especially true in the workplace where it hasn’t yet been dislodged by the various messaging apps as the preferred medium to send information.

    gazelles running in the bush
    2019-05-06 07:30:53

    Not Faster than the Lion

    Cyber threats are constantly evolving and growing. With breaches reported in the international press, it is easy to get lost in the white noise of cybercrime fear and misinformation. But there are some truly straightforward and clear steps that every business can take.

    1 2 3