Author: admin

[et_pb_section bb_built="1" fullwidth="off" specialty="off" transparent_background="off" allow_player_pause="off" inner_shadow="off" parallax="on" parallax_method="off" padding_mobile="on" make_fullwidth="off" use_custom_width="off" width_unit="on" make_equal="off" use_custom_gutter="off" custom_padding="0px||0px|" custom_padding_tablet="0px||0px|"][et_pb_row][et_pb_column type="2_3"][et_pb_divider _builder_version="3.0.83" height="40px" /][et_pb_text background_layout="light" background_position="top_left" background_repeat="repeat" background_size="initial" _builder_version="3.0.96" module_alignment="left" header_2_font="|600|||||||" header_2_font_size="20px" header_2_line_height="1.3em" header_2_text_color="#0c71c3"] Imagine if you were hit with a major server failure...

[et_pb_section bb_built="1" next_background_color="#000000"][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|phone" background_layout="light"] Patch Management is one of the five key technical controls required in the UK Government-backed Cyber Essentials Scheme. [/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|desktop" background_layout="light" header_2_font="|600|||||||" header_2_font_size="20px" header_2_text_color="#0c71c3"] Why Patch Management is important? [/et_pb_text][et_pb_text _builder_version="3.0.92" background_layout="light"] Vulnerabilities or security flaws are common in...

[et_pb_section bb_built="1" next_background_color="#000000"][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|phone" background_layout="light"] Malware Protection is one of the five key technical controls required in the UK Government-backed Cyber Essentials Scheme. [/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|desktop" background_layout="light" header_2_font="|600|||||||" header_2_font_size="20px" header_2_text_color="#0c71c3"] Why Malware Protection is important? [/et_pb_text][et_pb_text _builder_version="3.0.92" background_layout="light"] An organisation should implement robust malware software...

[et_pb_section bb_built="1" next_background_color="#000000"][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|phone" background_layout="light"] Access Control is one of the five key technical controls required in the UK Government-backed Cyber Essentials Scheme. [/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|desktop" background_layout="light" header_2_font="|600|||||||" header_2_font_size="20px" header_2_text_color="#0c71c3"] Why Access Control is important? [/et_pb_text][et_pb_text _builder_version="3.0.92" background_layout="light"] This control aims to ensure that only...

[et_pb_section bb_built="1" next_background_color="#000000"][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|desktop" background_layout="light"] Secure Configuration is one of the five key technical controls required in the UK Government-backed Cyber Essentials Scheme. [/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|desktop" background_layout="light" header_2_font="|600|||||||" header_2_font_size="20px" header_2_text_color="#0c71c3"] Why Secure Configuration is important? [/et_pb_text][et_pb_text _builder_version="3.0.92" background_layout="light"] A new computer, network devices or installed...

[et_pb_section fb_built="1" _builder_version="3.22"][et_pb_row _builder_version="3.25"][et_pb_column type="4_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_text _builder_version="3.27.4" custom_padding_tablet="" custom_padding_phone="" custom_padding_last_edited="on|phone"]Boundary Firewall & Internet Gateway is one of the five key technical controls required in the UK Government-backed Cyber Essentials Scheme. [/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version="3.25"][et_pb_column type="4_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_text _builder_version="3.27.4" header_2_font="|600|||||||" header_2_text_color="#0c71c3" header_2_font_size="20px" custom_padding_tablet="" custom_padding_phone="" custom_padding_last_edited="on|desktop"]Why Boundary...

[et_pb_section bb_built="1" admin_label="section" _builder_version="3.0.91"][et_pb_row _builder_version="3.0.91"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" background_layout="light"] Over the past 12 months, we were busy producing useful blog content for our amazing audience of social followers, email subscribers, customers, and customers-to-be. Didn't have time to read it all? Here are the top 9 most popular posts...

[et_pb_section bb_built="1"][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.105" custom_padding_last_edited="on|desktop" background_layout="light" header_2_font="|600|||||||" header_2_font_size="20px" header_2_text_color="#0c71c3"] What should business look for in their Outsourced IT Provider? [/et_pb_text][et_pb_text _builder_version="3.0.105" custom_padding="|100px||" custom_padding_last_edited="on|desktop" background_layout="light" header_2_font="|600|||||||" header_2_text_align="left"] One of the hardest decisions any business needs to make is who their partners will be. This is especially true when...