Latest from our business, security
and technology blog

Search the blog:

    2022-01-24 08:30:00

    What’s next for digital transformation?

    We’ve done COVID-19 transformation. But what’s next in terms of digital transformation? The Grant McGregor team considers how digital transformation might evolve through 2022 and beyond. For IT and business leaders, the huge rush at the start of the pandemic to facilitate work from home...

    2019-07-30 08:28:18

    The New Rules for Passwords in 2019

    Access control is fundamental to security – whether in your home, your office or your IT infrastructure. If passwords are the keys that open the doors to your IT estate for legitimate users, how do you stop them falling into the possession of malicious actors?

    gazelles running in the bush
    2019-05-06 07:30:53

    Not Faster than the Lion

    Cyber threats are constantly evolving and growing. With breaches reported in the international press, it is easy to get lost in the white noise of cybercrime fear and misinformation. But there are some truly straightforward and clear steps that every business can take.

    2019-02-25 07:30:55

    Passwords: Can we live without them?

    For thousands of years, passwords have been used as a means of authentication; a way in which people could be confident that security was maintained.

    2018-10-29 15:33:58

    The FBI Warns of a New Cyber Security Threat

    Most cyber security news recently has focused on the revelation of Russian military intelligence service attacks, but there has been a recent announcement about cyber security practice to which organisations of all sizes including small businesses should be paying much greater attention.

    2018-10-17 08:13:15

    How does an Information Asset Register ensure GDPR compliance?

    GDPR has focused business leaders’ thoughts on the data held within their organisations and how best to protect it. Since the first step towards securing anything is understanding what you have, an Information Asset Register is crucial. Grant McGregor explains what an Information Asset Register is...

    2018-09-03 07:30:39

    How Do You Stop a Phishing Attack?

    People are often the weakest link of any security infrastructure. Which means the best line of defence when it comes to preventing phishing attacks or other people-focused exploits is to ensure staff are aware of the risks.

    2018-08-06 07:30:29

    GDPR: the aftermath

    It’s now a little over two months since GDPR came into force. A little longer since those panicked conversations with your boss about what you actually need to do and that inbox full of marketing emails begging you to resubscribe. What have we learnt since then?

    2018-07-02 07:30:34

    6 Tips for Developing an IT Refresh Strategy for Mid-Size Businesses

    Managing your IT estate always comes down to balancing the sometimes-contradictory forces of budget and performance. An effective IT Refresh strategy is an important balancing bar in this difficult act.

    1 2 3 4 5