Author: admin

[et_pb_section fb_built="1" admin_label="section" _builder_version="3.22"][et_pb_row admin_label="row" _builder_version="3.25" background_size="initial" background_position="top_left" background_repeat="repeat"][et_pb_column type="4_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_text _builder_version="3.27.4" background_size="initial" background_position="top_left" background_repeat="repeat" border_style="solid"]Are you prepared in the event of data loss, natural disaster, cyber-attack, hardware failure or human error? Every business has to prepare for the worst. That’s why we put...

[et_pb_section admin_label="section"][et_pb_row admin_label="row"][et_pb_column type="4_4"][et_pb_text admin_label="Text" background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid"] You may have heard of Moore's Law which is an observation of the speed in the advancement of computing power. The most simplistic way to describe this is that computing power doubles roughly every year to...

[et_pb_section bb_built="1" admin_label="section"][et_pb_row admin_label="row" background_position="top_left" background_repeat="repeat" background_size="initial"][et_pb_column type="4_4"][et_pb_text background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid" background_position="top_left" background_repeat="repeat" background_size="initial" _builder_version="3.0.69"] Today’s big IT advantages come with major risks. Your networks and systems serve as your silent partner in operations. Should they fail – and when they do, it’s usually...

[et_pb_section bb_built="1" admin_label="section"][et_pb_row background_position="top_left" background_repeat="repeat" background_size="initial"][et_pb_column type="4_4"][et_pb_text background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid" background_position="top_left" background_repeat="repeat" background_size="initial"] Our Desktop Assistant, Monitoring & Automation tool - Sentinel is getting an upgrade, new code that allows us to make use of available technology, improving the services we deliver to our...

[et_pb_section admin_label="section"][et_pb_row admin_label="row"][et_pb_column type="4_4"][et_pb_text admin_label="Text" background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid"] Urban Network has been announced as the winner of Customer Service Award at the Thames Gateway Business Awards event, which took places in Canary Wharf, hosted by BBC business journalist Declan Curry on October 28, 2016. In...

[et_pb_section bb_built="1" admin_label="section"][et_pb_row admin_label="row" background_position="top_left" background_repeat="repeat" background_size="initial"][et_pb_column type="4_4"][et_pb_text background_layout="light" use_border_color="off" background_position="top_left" background_repeat="repeat" background_size="initial" _builder_version="3.0.100"] Security breached are costly and rarely a day goes without you seeing a headline about a new data breach. You might wonder how best to keep yourself safe online. One simple advice:...

[et_pb_section bb_built="1" fullwidth="off" specialty="off"][et_pb_row background_position="top_left" background_repeat="repeat" background_size="initial"][et_pb_column type="4_4"][et_pb_text background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid" background_position="top_left" background_repeat="repeat" background_size="initial"] A strong password is your first defence against hackers and cyber criminals. This month is Cyber Security Awareness Month, we will share simple tips on how to create secure password...

[et_pb_section bb_built="1" admin_label="section"][et_pb_row admin_label="row" background_position="top_left" background_repeat="repeat" background_size="initial"][et_pb_column type="4_4"][et_pb_text background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid" background_position="top_left" background_repeat="repeat" background_size="initial"] In 2015, we observed an increase of macro-based malware along with the spike in spam volume. The majority of the macro-based attacks often start with spammed messages containing attachments such...

[et_pb_section admin_label="section"][et_pb_row admin_label="row"][et_pb_column type="4_4"][et_pb_text admin_label="Text" background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid"] There are numerous ways to spot a fake email. The list below is not exhaustive but covers most common types of phishing attempts. [/et_pb_text][et_pb_text admin_label="Text" background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid"] The message contains poor spelling and grammar [/et_pb_text][et_pb_text admin_label="Text"...

[et_pb_section bb_built="1" admin_label="section"][et_pb_row admin_label="row" background_position="top_left" background_repeat="repeat" background_size="initial"][et_pb_column type="4_4"][et_pb_text background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid" background_position="top_left" background_repeat="repeat" background_size="initial"] The World Wide Web is a wonderful thing, never has it been so easy to find information, research your favourite topics or shop from the comfort of your armchair; it’s...