Latest from our business, security
and technology blog

Search the blog:

    2018-09-25 11:46:21

    How to ensure the success of your disaster recovery and business continuity plans

    The disaster recovery and business continuity expectations of senior business leaders are changing – how can IT managers respond to ensure the success of their disaster recovery and business continuity plans?

    2018-09-17 07:58:54

    What NOT to do when you lose your mobile device

    We rely so much on our smartphones these days, losing our phone or device (or having it stolen) would seem like a real crisis wouldn't it? So let's walk through what NOT to do, as well as what you should do if you find yourself in this situation.

    2018-09-03 07:30:39

    How Do You Stop a Phishing Attack?

    People are often the weakest link of any security infrastructure. Which means the best line of defence when it comes to preventing phishing attacks or other people-focused exploits is to ensure staff are aware of the risks.

    2018-08-06 07:30:29

    GDPR: the aftermath

    It’s now a little over two months since GDPR came into force. A little longer since those panicked conversations with your boss about what you actually need to do and that inbox full of marketing emails begging you to resubscribe. What have we learnt since then?

    2018-07-30 09:55:26

    The Beginner’s Guide to Encryption

    With organisations under more pressure than ever to protect their customers’ data, and more and more information being stored digitally, Grant McGregor takes a look at encryption and the possibilities it offers to help small businesses protect their data.

    2018-07-09 08:06:46

    Secure Yourself this Summer! How to Holiday with Peace of Mind

    A little bit of planning can help you ensure that you not only have a great holiday, but will return home to find your computer and your electronically held data intact too.

    2018-05-07 07:30:40

    How Can Technology Make Home Working More Productive?

    Flexible working practices have been shown to be a key driver for employee engagement productivity.

    2018-04-16 11:35:00

    What Is End Point Security and Do I Need It?

    Where are the end points on your network?

    2018-03-05 07:30:53

    Best Practice Password Security

    Passwords have an important role to play in any organisation’s cyber security – whether to protect user access to applications, data or email. So what should organisations be doing to ensure that the passwords and password policies being used are up to scratch?

    3 4 5 6 7