Latest from our business, security
and technology blog

Search the blog:

    2018-05-07 07:30:40

    How Can Technology Make Home Working More Productive?

    Flexible working practices have been shown to be a key driver for employee engagement productivity.

    2018-04-23 07:30:05

    How Mobilisation Can Help Empower Your Employees

    The traditional employment model of jobs for life and a 9-5, Mon-Fri has undergone a major shake-up over the last couple of decades.

    2018-04-16 11:35:00

    What Is End Point Security and Do I Need It?

    Where are the end points on your network?

    2018-04-09 12:46:00

    Malware is Getting Even Smarter. What Can You Do to Protect Your Business?

    If you think that installing Anti-virus software on your office computer is going to protect you from the latest generation of malware, think again. Every day, with over 230,000 new malware threats created and released online, we have watched the evolution of these programmes, from primitive...

    2018-04-03 08:48:29

    GDPR: Do Business Emails Count as 'Personal Data'?

    As we approach closer to the GDPR deadline, we've been getting a lot of questions regarding whether business email addresses and contact details will come under the GDPR as 'personal data'. We have been waiting on a guide to fully explain this, and last week IASME - Certifying Body for Cyber...

    2018-03-28 08:34:42

    Is it Time for an IT Spring Clean?

    The life of an IT manager can often feel like a thankless task. Staying on top of daily and weekly tasks can be difficult when problems and projects shift your focus away from basic housekeeping.

    2018-03-19 10:40:22

    How the GDPR can help to re-establish a great relationship with your customers.

    Since it landed in 2015, the GDPR is a big leap in data protection legislation and with the ruling applicable across the whole of Europe, we are finally bridging the gap between our digital identities and the law.

    2018-03-12 14:59:51

    The Dangers of Over-Sharing Online

    We’ve all heard some horror stories: the divorce lawyers trawling your social media accounts, the gift for any would-be stalker that is your Facebook Timeline – but what happens when the dangers of oversharing online cross into the professional realm?

    2018-03-05 07:30:53

    Best Practice Password Security

    Passwords have an important role to play in any organisation’s cyber security – whether to protect user access to applications, data or email. So what should organisations be doing to ensure that the passwords and password policies being used are up to scratch?