Network Access Control

The number of endpoints on IT networks is expanding at an ever-increasing rate. User devices have moved beyond the traditional desktop and laptop to include smartphones, tablets, and wearable devices with network connectivity, such as the Apple Watch. The rapid growth seen for mobile devices over the last decade may now have stalled, but the […]

WannaCry Ransomware Crisis – Two Years On

It is two years since the WannaCry ransomware malware spread globally. Figures suggest it infected about 230,000 PC’s in nearly 150 countries. It also forced many organisations to shut down their PC’s and Internet access to prevent infections. Official figures published by the NHS in the UK show that a third of all the hospital […]

Securing Your Digital Identity

Many people have experienced the gut-churning feeling when they check their credit card statement and see unfamiliar transactions or log on to a social media account and see posts they didn’t make. That mobile phone SIM bought in a country they’ve never been to, and the Facebook post with a link to a phishing site […]

Beware Ransomware!

“The files on this computer have been encrypted! You have 96 hours to submit payment, otherwise your files will be permanently destroyed!” The message no one wants to read, you’ve been hit with RANSOMWARE. Such attacks can be costly for businesses as ransomware infects a computer, blocks access to computer files and demands that money […]

The Elephant in the Sky – Cloud Security!

Traditional network security made sense when all your applications were hosted in your data centre and users were all on the network, there was a sense that you were in control, if you built your firewalls and protected the perimeter you felt secure. With the continuing progression of apps moving to the cloud, the masses […]

Don’t Let Your Trash Become a Hackers Treasure

We are all familiar with deleting emails, files and documents to free up space on our computers. But where does it go? What really happens to it? Is it really gone forever? And most importantly, can cyber criminals get access to it? Many of us have at one time or another accidentally deleted items we […]

Business Continuity – Keeping your Data Safe and Business Trading

Identity and Access Management (IAM) is one of the most important areas in IT security today and it’s only becoming more prominent as large-scale breaches within the private and public sector continue to shake consumer trust and provoke ever-increasing government regulation. What is it? Identity and access management (IAM) is the security discipline that enables the right individuals to access the […]

Square or Round Wheels?

It all boils down to 1 question, “Are you too busy to improve?” This is a great enabler for the discussion on how to improve. It’s so simple and a great way to start the discussion on any complex matters. I have seen it quoted, shared and commented on many times, which tells us 2 […]

Business Continuity – Communicating Effectively Internally In Times Of Disruption

It can be argued that a company’s most valuable, and sometimes most underestimated, resource is its employees. Communicating effectively with them in times of disruption can make the difference between a smooth recovery from a disaster or one that is plagued with further issues. In times of disaster or disruption, employees may need to work […]

8 Top Tips for Keeping Your IT in Great Shape

In one way or another, Information Technology (IT) is an integral part of any business and we often don’t realise how much we rely on it until it’s non-operational. When such a thing occurs, business day-to-day operations are slowed and can even grind to a halt. Luckily, you can reduce the stress and damage that […]