Latest from our business, security
and technology blog

Search the blog:

    2018-05-28 07:30:38

    GDPR - the end of the beginning...

    Well, unlike some predicted, the sky did not actually fall in last Friday on 25th May when GDPR came into enforcement in UK law. But some significant changes did come into play that should not be ignored.

    2018-03-28 08:34:42

    Is it Time for an IT Spring Clean?

    The life of an IT manager can often feel like a thankless task. Staying on top of daily and weekly tasks can be difficult when problems and projects shift your focus away from basic housekeeping.

    2018-03-12 14:59:51

    The Dangers of Over-Sharing Online

    We’ve all heard some horror stories: the divorce lawyers trawling your social media accounts, the gift for any would-be stalker that is your Facebook Timeline – but what happens when the dangers of oversharing online cross into the professional realm?

    2018-03-05 07:30:53

    Best Practice Password Security

    Passwords have an important role to play in any organisation’s cyber security – whether to protect user access to applications, data or email. So what should organisations be doing to ensure that the passwords and password policies being used are up to scratch?

    2018-02-26 09:42:01

    5 Things Every BYOD Policy Needs

    Bring Your Own Device (BYOD) policies are rapidly gaining traction in the modern workplace owing to the flexibility and convenience they provide to both employees and their employers.

    2018-02-12 07:30:27

    Could Social Media Be Your Security Weak Spot?

    Social Media is so much a part of our lives these days, both personally and in business.

    2018-02-07 14:17:47

    6 Things You Can Do This Year to Boost Your IT Performance in 2018

    We take a look at six simple things you can do this year to boost IT performance and productivity in 2018.

    2018-01-22 12:37:56

    Could Co-Sourcing be the Solution You've Been Looking For?

    Asset lean might be the new mantra, but can that really apply to critical IT services when you are a small or medium sized business? How do you keep costs to a minimum without jeopardising operational performance?

    2018-01-16 15:18:08

    The Two New IT Vulnerabilities that Affect Nearly Everyone

    You’ve probably heard of Spectre and Meltdown by now – the two new vulnerabilities that researchers have identified as affecting chips from Intel, AMD and ARM. We take a look at the risk they pose and what you should be doing about them.

    5 6 7 8 9