Latest from our business, security
and technology blog

Search the blog:

    2019-05-20 10:16:02

    Can Outsourced IT and Internal IT Work Together?

    Outsourced IT and Internal IT provision is often posited as an either/or choice. On the contrary, says Grant McGregor, the relationship can be a highly successful collaboration.

    gazelles running in the bush
    2019-05-06 07:30:53

    Not Faster than the Lion

    Cyber threats are constantly evolving and growing. With breaches reported in the international press, it is easy to get lost in the white noise of cybercrime fear and misinformation. But there are some truly straightforward and clear steps that every business can take.

    2019-04-30 08:23:21

    Education, Education, Education

    Those of us of a certain age will remember the promise that things can only get better… and the mantra of “education, education, education”. It all seems a long way away today. The good news? When it comes to cybersecurity, things can get significantly better with a relatively small investment in...

    2019-04-17 14:45:05

    Cyber Essentials – Easy as 1-2-3?

    The Government-backed Cyber Essentials scheme is becoming both increasingly well-known and applied for. We think this is a good thing.

    2019-04-03 14:29:21

    Detox Your Digital

    No, we’re not talking about cutting down the time you spend on social media (but we’re quite happy to advocate that too). We’re talking about a corporate digital detox: a thorough audit and cleanse of your entire IT estate – and how to go about it.

    2019-03-26 10:23:23

    The (Free) First Step to Better IT!

    In over 30 years in IT, I still encounter many business owners and IT-decision makers who find themselves spending too much of their valuable time dealing with staff technology problems and continually looking for work-arounds to the IT issues.

    2019-03-04 07:30:12

    How setting up SOPs can help you deal with IT points of failure

    Creating Standard Operating Procedures (SOPs) covering your core technology is valuable even within a small business. It will save you a lot of stress when having to deal with critical events and help your team when having to think and act under pressure. Moreover, setting up proactive actions will...

    2019-02-25 07:30:55

    Passwords: Can we live without them?

    For thousands of years, passwords have been used as a means of authentication; a way in which people could be confident that security was maintained.

    2019-02-18 13:35:36

    Windows Server 2008 R2 Approaching End of Life

    Are you still using Windows Server 2008 R2 within your business IT environment? If so, it’s time to start planning a migration strategy as the server technology approaches its end of life.

    2 3 4 5 6