Latest from our business, security
and technology blog

Search the blog:

    2017-08-21 08:56:12

    Cloud 101: SaaS, PaaS & IaaS Explained

    There has been a seismic change in the way IT is delivered over the past decade – and the hype about our continued move to “the Cloud” seems to continue unabated. What does it all mean?

    2017-08-14 07:30:40

    Comparing the Advantages with the Pitfalls of BYOD

    Research from Gartner has shown that 39% of employees surveyed rely on personally owned mobile devices in the workplace. Use of corporate owned devices was minor in comparison – just 10%. There are of course obvious reasons for the decline of corporate devices – primarily being the high cost burden...

    2017-07-03 07:30:27

    You’re Not Too Small to Be a Victim: The Obvious IT Security Fails Small Businesses Can Avoid

    2017-06-19 10:56:25

    The Rise of Personally-Targeted Spear-Phishing Attacks & How to Defend Yourself From Them...

    As we all become more wary about the tell-tale signs of a phishing email attack, criminals are turning to a more targeted approach to email scamming: the spear-phishing attack.

    2017-06-12 09:30:34

    Your IT perimeter: where is it and how do you best defend it?

    Gone are the days when the limits of your security cordon were the walls of the datacentre. Now, it isn’t the stray floppy disk or errant memory stick we need to worry about – many of us are wondering where the limits of our IT perimeter are.

    2017-06-05 11:03:21

    Is the Password Still Relevant to Control Identity and Access to Your IT Systems and Data?

    A lot of people believe that the password is an invention of the age of computing, a necessary part of securing IT systems from hackers and other malevolent forces – intentional or unintentional. In truth, the password is about as old as human civilisation.

    2017-05-15 10:11:32

    How to Protect Your Business Against Cyber-Attacks and Data Theft

    Wow! Quite a weekend of news around Cyber Security... This was an article we had written a couple of weeks ago now and had scheduled for publication today just for the sake of offering our readers and supported end-users ongoing education about cyber security and playing your part...

    2017-04-10 15:25:06

    Four Top Tips for Reducing IT Expenditure

    Some level of IT expenditure is necessary in a business world that’s increasingly driven by technology.

    2017-03-20 14:10:19

    (Not Always Obvious) Things to Look Out for to Avoid Phishing Scams

    Phishing scams are incredibly common nowadays. Luckily anyone who uses a computer on a daily basis is now very used to ignoring the most obvious types of phishing emails with poor spelling or grammar in the content; not to mention that those that are sent out en masse will nearly always be caught...