Latest from our business, security
and technology blog

Search the blog:

    2023-09-04 15:20:00

    Tips for successfully implementing a zero-trust approach to cyber security

    As increasing numbers of businesses have moved to a cloud environment and remote working models, Zero Trust has gained a place in the everyday cyber security approaches of many organisations.

    2022-08-29 07:30:00

    Your 2022 update on the ransomware threat

    Like many types of cybercrime, ransomware is a steadily growing threat. The Grant McGregor team looks at the current state of the threat – and what to do about it. More than two-thirds of organisations questioned as part of the 2022 Proofpoint survey reported that they had suffered at least one...

    2022-07-06 11:26:50

    12 questions to ask your web developer about cyber security

    Our team is focused on business support and cyber security rather than web design. Nevertheless, the security of your website is important to us. In this blog, we’ll outline some of the questions you should be asking your website developer to ensure that your website is as protected as it needs to...

    2021-02-15 08:30:00

    What is Zero Trust and Should I Be Implementing It?

    The IT world is full of acronyms and strange phrases. “Zero Trust” is one of the latest to be bandied about, but what does it mean? And is it something your organisation needs to be thinking about? Zero Trust is a model for IT security. Although it is not a new concept, there is an increasing...

    laptop graphic with hand signalling stop - access denied
    2020-10-12 07:30:00

    What is the principle of “least privilege”? And should you be following it?

    You might have heard or read about the principle of least privilege in the context of cyber security – especially if you have looked into the Cyber Essentials scheme. This blog looks at why it’s important and how it can be implemented successfully.

    1