Latest from our business, security
and technology blog

Search the blog:

    2019-07-30 08:28:18

    The New Rules for Passwords in 2019

    Access control is fundamental to security – whether in your home, your office or your IT infrastructure. If passwords are the keys that open the doors to your IT estate for legitimate users, how do you stop them falling into the possession of malicious actors?

    2019-07-01 09:58:08

    One Year On from GDPR: What’s Changed?

    The General Data Protection Regulation (GDPR) came into effect on May 25, 2018. At the time it was heralded as a major change in the way individuals and organisations will think about – and collect, manage and secure – data.

    gazelles running in the bush
    2019-05-06 07:30:53

    Not Faster than the Lion

    Cyber threats are constantly evolving and growing. With breaches reported in the international press, it is easy to get lost in the white noise of cybercrime fear and misinformation. But there are some truly straightforward and clear steps that every business can take.

    2019-04-30 08:23:21

    Education, Education, Education

    Those of us of a certain age will remember the promise that things can only get better… and the mantra of “education, education, education”. It all seems a long way away today. The good news? When it comes to cybersecurity, things can get significantly better with a relatively small investment in...

    2019-01-07 07:30:49

    The Five Vital Components to Think About When Creating a New IT Strategy

    Developing an IT strategy can be a daunting task to start, especially if you’ve not done it before. Our new guide helps to demystify the process and offers a five-step approach to help you to get it done.

    2018-11-12 07:30:19

    Staff Training: Your First Line of Defence in IT Security

    Staff training has a key role to play in any cyber security and information management strategy. So how do you begin to plan what needs to be done?

    2018-09-03 07:30:39

    How Do You Stop a Phishing Attack?

    People are often the weakest link of any security infrastructure. Which means the best line of defence when it comes to preventing phishing attacks or other people-focused exploits is to ensure staff are aware of the risks.

    2018-07-30 09:55:26

    The Beginner’s Guide to Encryption

    With organisations under more pressure than ever to protect their customers’ data, and more and more information being stored digitally, Grant McGregor takes a look at encryption and the possibilities it offers to help small businesses protect their data.

    2018-06-04 14:14:46

    Computer Says: User Error

    When I first started my working life, I worked for an organisation where, if you called the IT helpdesk, the “help” consisted of two standard responses:

    1 2 3