Grant McGregor Blog
Posts about

cybersecurity

What is the roadmap for technology investment in 2021 and beyond?

What is the roadmap for technology investment in 2021 and beyond?

Technology spending through 2020 held strong, despite the pandemic – largely driven by the sudden shift to remote working. But what are the major trends that are going to shake up IT in 2021? Few people could have predicted the events of last year. And few – if any – a traditional business...

Read More

The State of Email Security Update

The State of Email Security Update

At the end of last year, security company Mimecast released the latest version of its annual state of email security report – and it revealed some worrying findings. What should organisations be doing to protect themselves from the current attack vectors? In this year’s report(1), Mimecast...

Read More

The Role of COVID-19 in Fast-Tracking Digital Transformation

The Role of COVID-19 in Fast-Tracking Digital Transformation

COVID-19 has brought many changes with it – including the fast tracking of digital transformation for many businesses and organisations. It’s hard to look for positives in the pandemic, when so many people have been so affected by it. However, it has served to reveal to us the ingenuity and...

Read More

What does “back to work” mean for your business continuity planning?

What does “back to work” mean for your business continuity planning?

Organisations must revisit their operational strategies and business continuity planning in the wake of the COVID-19 pandemic. Here, the Grant McGregor team considers what this might mean for your business continuity planning and, especially, IT. In a recent blog, we looked at how the current...

Read More

Why You Should be Using 2 Factor Authentication Right Now!

Why You Should be Using 2 Factor Authentication Right Now!

According to the Verizon 2019 Data Breach Investigations Report, 62% of breaches not involving an Error, Misuse, or Physical action (in other words, wounds that weren’t self-inflicted) involved the use of stolen credentials, brute force, or phishing.

Read More

Are you doing enough to protect your staff against Phishing?

Are you doing enough to protect your staff against Phishing?

In IT, we talk a lot about protecting our systems and data against cyber-attack. However, there is a growing realisation that this is only part of the picture. We need to do much more to protect our people too.

Read More

From Spam to Phish – Cyber Crime on a Plate

From Spam to Phish – Cyber Crime on a Plate

Email – love or hate it as a form of communication, it touches most of us everyday and shows no signs of going away. This is especially true in the workplace where it hasn’t yet been dislodged by the various messaging apps as the preferred medium to send information.

Read More

Not Faster than the Lion

Not Faster than the Lion

Cyber threats are constantly evolving and growing. With breaches reported in the international press, it is easy to get lost in the white noise of cybercrime fear and misinformation. But there are some truly straightforward and clear steps that every business can take.

Read More

Education, Education, Education

Education, Education, Education

Those of us of a certain age will remember the promise that things can only get better… and the mantra of “education, education, education”. It all seems a long way away today. The good news? When it comes to cybersecurity, things can get significantly better with a relatively small investment in...

Read More

Office 365 Popularity Grows…as does its potential vulnerability

Office 365 Popularity Grows…as does its potential vulnerability

Since its introduction, Microsoft’s Office suite products have clearly been the tools of choice for most of the world’s businesses - most of us using at least one of the applications on a daily basis.

Read More

    Categories

    see all