How to manage disaster recovery
Cybercrime is becoming more and more frequent with 50% of businesses suffering a cyber-attack attempt every week in 2021. The rise – partly due to the Log4J vulnerability – helped…
Read PostCybercrime is becoming more and more frequent with 50% of businesses suffering a cyber-attack attempt every week in 2021. The rise – partly due to the Log4J vulnerability – helped…
Read PostPasswords are a vital part of information and network security, serving to protect user accounts. But a password, if poorly chosen, has the ability to put an organsiations entire network…
Read PostIn the wake of the escalating situation with further violations of Ukraine’s territory by Russia, the National Cyber Security Centre (NCSC) has recently released advice on how organisations in the…
Read PostThe move to hybrid work promises a myriad of benefits including increased collaboration, productivity and a better work-life balance. For this reason, it is no surprise that 91% of the…
Read PostThe term digital transformation has become widely used over the past five years. While it is often referring to the adoption and integration of digital technologies to transform the way…
Read PostChoosing to outsource your IT department rather than keep it in-house offers organsiations, of all sizes, a number of key benefits. While proactive IT support, monitoring your infrastructure, and cloud…
Read PostIn order for businesses to avoid a cyberattack, it is important to understand the tactics cybercriminals are using, and what employees can do to stop them in their tracks. If…
Read PostAs businesses and organisations across the globe embrace remote and hybrid working, the ‘new normal’ has seen companies not only want but need to modernise their communications systems. Remote and…
Read PostRegardless of the industry, your business operates in, it is essential that employees are able to access the applications and IT systems required to be productive and work effectively. Remote…
Read PostOver the past two years, Microsoft has worked hard to adapt its solutions to suit remote and hybrid work. This has resulted in many features designed to aid in communication,…
Read PostIn January 2022, the biggest update to Cyber Essentials technical controls since its launch will be introduced by the NCSC and IASME. The updated set of requirements is seen as…
Read PostBetween 2020 and 2021, 4 in 10 businesses and a quarter of charities reported some form of cyber security breach or attack. These figures are increasing year-on-year as cybercriminals innovate…
Read Post