Latest from our business, security
and technology blog

Search the blog:

    2019-04-24 14:51:28

    SCVO Releases Additional Cyber Security Vouchers to Third Sector

    Act now. Applications will not be accepted after 3rd May 2019.

    2019-04-17 14:45:05

    Cyber Essentials – Easy as 1-2-3?

    The Government-backed Cyber Essentials scheme is becoming both increasingly well-known and applied for. We think this is a good thing.

    2019-04-03 14:29:21

    Detox Your Digital

    No, we’re not talking about cutting down the time you spend on social media (but we’re quite happy to advocate that too). We’re talking about a corporate digital detox: a thorough audit and cleanse of your entire IT estate – and how to go about it.

    2019-03-26 10:23:23

    The (Free) First Step to Better IT!

    In over 30 years in IT, I still encounter many business owners and IT-decision makers who find themselves spending too much of their valuable time dealing with staff technology problems and continually looking for work-arounds to the IT issues.

    2019-03-18 11:15:43

    Office 365 Popularity Grows…as does its potential vulnerability

    Since its introduction, Microsoft’s Office suite products have clearly been the tools of choice for most of the world’s businesses - most of us using at least one of the applications on a daily basis.

    2019-02-25 07:30:55

    Passwords: Can we live without them?

    For thousands of years, passwords have been used as a means of authentication; a way in which people could be confident that security was maintained.

    2019-02-18 13:35:36

    Windows Server 2008 R2 Approaching End of Life

    Are you still using Windows Server 2008 R2 within your business IT environment? If so, it’s time to start planning a migration strategy as the server technology approaches its end of life.

    2019-02-11 11:03:26

    Urgent Call to Action if You Are Using Windows 7

    Are you using the Windows 7 operating system on your PCs and laptops? If so, it is time to take action and start planning an upgrade to Windows 10.

    2019-01-14 07:30:31

    Advancing Your IT Strategy: How to Identify Critical Vulnerabilities and Points of Failure

    In a recent blog, we looked at the five steps required to develop an effective IT strategy. In this article, we will take a deeper look into one of these key stages: how to identify critical vulnerabilities and points of failure.