Search the blog:
Another month, another high-profile attack… or so it seems at the moment. The latest in the long line was US data firm Equifax – with a breach that affected more than 143 million American consumers. Even if you aren’t holding that much customer data, how do you recover from a breach like that?
Technology is about innovation and innovation in business is all about doing things differently in order to provide better products and solutions, and an improved service to customers.
As we all become more wary about the tell-tale signs of a phishing email attack, criminals are turning to a more targeted approach to email scamming: the spear-phishing attack.
Gone are the days when the limits of your security cordon were the walls of the datacentre. Now, it isn’t the stray floppy disk or errant memory stick we need to worry about – many of us are wondering where the limits of our IT perimeter are.
A lot of people believe that the password is an invention of the age of computing, a necessary part of securing IT systems from hackers and other malevolent forces – intentional or unintentional. In truth, the password is about as old as human civilisation.
In today’s market, it can be very difficult for SMBs to stand out.
With flexible working on the increase, more small businesses than ever are effectively working in a virtual office.
Technology moves on quickly these days. The start of a new year is a great time to reassess how you use technology within your business, what can be changed for improved results and what is available that’s not currently being utilised, but may be beneficial.