Why You Need to Understand “Secure by Design” Cybersecurity Practices
Cybersecurity has become a critical foundation upon which many aspects of business rely. Whether you’re...
Cybersecurity has become a critical foundation upon which many aspects of business rely. Whether you’re...
The use of AI-driven processes is exploding. Every time you turn around, software has gotten more intelli...
Imagine you’re working away on your PC and see a Windows update prompt. Instead of ignoring it, you tak...
In today’s world, sustainability isn’t just a buzzword; it’s a necessity. Businesses ar...
Smart homes have become a ubiquitous part of modern living. It doesn’t even seem unusual anymore to tel...
Cybercriminals can launch very sophisticated attacks. But it’s often lax cybersecurity practices that e...
Software-as-a-Service (SaaS) has revolutionized the way businesses operate. It offers convenience, scalab...
Endpoint management has changed a lot over the last two decades. There was a time when companies housed a...
Two monitors are often better than one when it comes to getting things done efficiently. A dual-monitor s...
Let’s dive into a topic that might give you the chills—cybersecurity skeletons in the closet. You may...
As technology continues to advance, so does the need for heightened awareness. As well as proactive measu...
Most people are familiar with their device’s Airplane Mode. You’ve probably used it when jetting ...
Apple’s iOS updates have always been eagerly anticipated. iPhone and iPad users around the world ge...
Running a small business can be challenging. But advancements in technology have opened a world of opport...
In today’s ever-evolving digital landscape, small businesses have more opportunities than ever. Man...
LinkedIn has become an invaluable platform for professionals. People use it to connect, network, and expl...
As technology continues to advance, so does the landscape of design tools. Microsoft has been a company a...
When you hear about Microsoft adding security apps to M365, it’s often the business versions. But the p...
Cybersecurity has become paramount for businesses and individuals alike. Cyber threats abound, and data b...
In today’s digital landscape, cybersecurity threats continue to evolve. They pose significant risks...
Remote work has become increasingly popular in recent times. It provides flexibility and convenience for ...
In today’s digital workplace, printing remains an essential function. This is true for just about a...
Moving can be a chaotic and stressful time. Especially when it comes to handling your valuable technology...
In today’s digital age, technology plays a significant role in our lives. But along with the rapid ...
Cybersecurity threats are becoming increasingly sophisticated and prevalent. In 2022, ransomware attacks ...
Advanced AI is a new buzzword in cloud computing. The launch of tools like ChatGPT and Bard have made big...
Online shopping has become a common activity for many people. It’s convenient, easy, and allows us ...
As cyber threats continue to increase, businesses must take proactive steps. They need to protect their s...
In recent years, electronic mail (email for short) has become an essential part of our daily lives. Many ...
What would you do if your business suffered a ransomware attack tomorrow? Do you have a contingency plan ...
Cloud account takeover has become a major problem for organizations. Think about how much work your compa...
Passwords are the most used method of authentication, but they are also one of the weakest. Passwords are...
Data visualization is a powerful tool for communicating complex data. It presents it in a simple, easily ...
It’s hard to turn around online these days without running into ChatGPT. Both Bing and Google are lever...
Many people worry about someone hacking their computer. But they’re not really thinking about their wir...
Netflix is one of the most popular and well-known streaming services. It has nearly 231 million subscribe...
The number of apps and web tools that employees use on a regular basis continues to increase. Most depart...
You wouldn’t think a child’s toy could lead to a breach of your personal data. But this happens all t...
Scheduling appointments is a common activity. Salespeople often set up virtual appointments to answer que...
At the beginning of each year, a group of global innovators meets. They introduce and show off breakthrou...
Data privacy has been a growing requirement ever since the internet age began. So much personal informati...
Customers look for convenience. In today’s world that means technology that makes their life easier. Fr...
Once data began going digital, authorities realized a need to protect it. Thus, the creation of data priv...
Companies both large and small share this one cybersecurity problem. They have computers that are still r...
It’s a common theme. You begin seeing these amazing CGI images of your friends on Facebook or Instagram...
Microsoft 365 is one of the most popular cloud platforms in the world, with about 345 million paid seats....
The need to back up data has been around since floppy disks. Data loss happens due to viruses, hard drive...
We have made it to the finals, but need your help! We’re happy to announce that Urban Network are f...
Whether you sell shoes or run an accounting firm, you need some type of technology to operate. Today’s ...
Technology vulnerabilities are an unfortunate side effect of innovation. When software companies push new...
Imagine you’re going about your day when suddenly you receive a text from the CEO. The head of the comp...
March 31st is WorldBackupDay: the day to prevent data loss! Go through the steps on the link below and re...
Misconfiguration of cloud solutions is often overlooked when companies plan cybersecurity strategies. Clo...
Since the pandemic, employers around the world have needed to change. They’ve had to shift how thei...
Great effort by the team to make sure we are certified again for IASME Cyber Assurance, and recognised as...
There are a lot of things that have changed since the invention of the internet. One of these is how we b...
Microsoft released the Windows 11 operating system (OS) over a year ago. It was largely well-received as ...
We are proud to announce that we have recently been recognised as one of the TOP 50 Best Managed IT Comp...
No business wants to suffer a data breach. But unfortunately, in today’s environment, it’s difficult ...
Cybersecurity researchers uncovered an alarming mobile statistic. During the first few months of 2022, mo...
The new buzzword around town is “metaverse.” But what does that actually mean for businesses? Is it j...
There’s a reason that browsers like Edge have added breached password notifications. Data breaches are ...
February happens to be Urban Network’s birthday. 20 years ago the foundations were laid to create s...
Our technology inevitably comes with us when we travel. Most of us won’t even travel to the end of the ...
Zomentum Announced the Top Influential Partners of 2022: Leading the Way in Growth and Innovation –...
If you follow Microsoft products, then you may know about Microsoft Ignite. Held annually, it generates m...
The new year is well underway, and it’s a time of renewal as we plan for the possibilities to come in 2...
The global home security market has been growing by leaps and bounds. By 2026, experts expect the market ...
You often hear the words “digital transformation” and “collaboration.” But what do they actually ...
The global pandemic put a big emphasis on the need to run a business from anywhere. Enabling employees to...
One constant struggle in offices is the balance between productivity and security. If you give users too ...
Have you ever bought a new computer and then had buyer’s remorse a few months later? Maybe you didn’t...
Cybersecurity insurance is still a pretty new concept for many SMBs. It was initially introduced in the 1...
Paying attention to your customer experience directly impacts your bottom line. Companies that are “cus...
Just five or six years ago, VoIP was still considered a “different” type of business phone system. On...
It seems that nearly as long as passwords have been around, they’ve been a major source of security con...
Endpoints make up much of a company’s network and IT infrastructure. This is a collection of computers,...
When the year is coming to a close, it’s the perfect time to plan for the future. Most businesses begin...
One of the most difficult types of attacks to detect are those performed by insiders. An “insider” wo...
Urban Network is proud to continue to support men’s mental health charity Andy’s Man Club as our Corp...
Digital footprints cover today’s modern workplace. Employees begin making these the moment theyR...
The Christmas shopping season is taking off. This means that scammers have also revved up their engines. ...
Have you felt more secure from cyberattacks because you have a smaller business? Maybe you thought that y...
Paul Moore of Urban has stepped down from his position as Financial Director of the Network Group after s...
Microsoft 365 is the most popular of all major office productivity software. It has 48.8% of the global m...
The pandemic has been a reality that companies around the world have shared. It required major changes in...
After being the main entry to the internet in the late 1990s and early 2000s, Internet Explorer (IE) is g...
Software vulnerabilities are an unfortunate part of working with technology. A developer puts out a softw...
Productivity can be challenging to track, no matter where employees are working. How do you know they’r...
Phishing. It seems you can’t read an article on cybersecurity without it coming up. That’s because ph...
The Charity free@last has had a boost to its available hardware at its Community Centre in Nechells in th...
Many small businesses make the mistake of skipping policies. They feel that things don’t need to be s...
Cloud file storage revolutionized the way we handle documents. No more having to email files back and for...
One of the big draws of a laptop computer is that you can use it anywhere. You don’t need to have it pl...
Urban Network has completed the acquisition of Dedred Coms, further bolstering the Business Transformatio...
One constant about technology is that it changes rapidly. Tools that were once staples, like Internet Exp...
The number of internet-connected devices in homes has been growing. It’s increased exponentially ov...
“Hybrid office” is the new buzzword you’ll hear used in business discussions. It’s the mix of...
Early this year Urban Network announced that they have chosen men’s mental health charity ANDYSMANCLUB,...
Smartphones and tablets are often the preferred device for communications, web searching, and accessing m...
Phishing is the number one method of attack delivery for everything from ransomware to credential theft. ...
Any cyberattack is dangerous, but the particularly devastating ones are those on supply chain companies. ...
Over 2.4 million searches happen every minute on Google. It’s often the first stop people make when the...
In 2020, 75% of companies around the world experienced a phishing attack. Phishing remains one of the big...
Whether you work remotely or in an office, the line between personal and work tasks can become blurred wh...
Technology and IT constantly continues to move forwards, providing businesses with new and innovative sol...
How would you feel if one day your printer whirred into motion and printed out a 5-step list on how to av...
If you are considering outsourcing your IT support, then using an outsourced managed IT provider has cons...
What is phishing? Phishing is a common and increasingly sophisticated form of cybercrime, designed to lur...
Urban Network has nominated men’s mental health charity Andy’s Man Club, which aims to reduce male su...
The world of Information Technology is fast-paced and ever-evolving, so at Urban Network we are constantl...
Managing your staff’s performance to increase productivity is a multi-faceted task in the modern office...
Many businesses use Microsoft or MS Word as part of the Office suite of software. But are you and your st...
Cyber Essentials – a reminder As covered in our recent series of blogs on the subject, and as you are n...
What is Multi-factor Authentication? Multi-factor Authentication (MFA) is a cyber-security method that as...
Over the last two years, the global pandemic has seen massive amounts of business activity taken online, ...
There has been a huge industry buzz around the release of Windows 11, the latest incarnation of Microsoft...
After 10 years, Microsoft has announced what is being described as a “substantive’ change to commerci...
Microsoft Edge is finally upgrading one of its most useful features Tracking down the exact information y...
Microsoft Excel is getting a whole lot more customization Microsoft is expanding its spreadsheet software...
We’ve made it! We have discussed four of the five controls as required by Cyber Essentials to achieve t...
We have already covered four of the five controls as required by Cyber Essentials to achieve their accred...
The Cyber Essentials accreditation has five key controls that need to be implemented and maintained in or...
Microsoft 365 will tell your boss if you’re misbehaving online Microsoft is working on a couple of ...
Microsoft Teams to get faster and more relevant search results Earlier this year, Microsoft announced tha...
As we have explored, the Cyber Essentials accreditation has five key controls that need implementing and ...
As we explained previously, the Cyber Essentials accreditation has five key controls that need implementi...
The modern world of work is full of cyber security vulnerabilities, so it is essential that you do everyt...
Microsoft launches Surface Pro 8, Laptop Studio, and Duo 2 phone Windows 11 maker unveils hybrid PC produ...
Price change for Microsoft 365 Today we are announcing changes to our commercial pricing for Microsoft 36...
In the previous blog in the series we explored the power that technology holds in our lives in the modern...
Our lives in the modern world revolve around technology – everything we do is influenced by it from...
Microsoft Teams is dropping support for iOS 13 and lower in October Microsoft is preparing to drop suppor...
Windows 365 release date, pricing, features and everything else you need to know Microsoft has finally un...
How to Quickly Clean Up Your Microsoft Outlook Inbox We see all sorts of advice and methods for tidying u...
BT and Microsoft announce strategic partnership BT and Microsoft today announced a new strategic partners...
Microsoft offers more detail on auto-delete of Microsoft Teams meeting recordings We recently reported th...
As we have explored in our previous article, technology is the driving force of our lives, and this is th...
Technology, the lynchpin of our lives in the modern world – its presence in our lives is more important...
Windows 11 is putting Microsoft Teams front and centre The latest tease of Windows 11 has suggested that ...
Microsoft Teams on mobile is finally getting this key feature Using Microsoft Teams on your smartphone co...
Microsoft Teams is getting its own music mode and new meeting controls Microsoft is working on a new feat...
Has Microsoft Teams presented an analytics gap? Nearly a year on from the first UK lockdown and a mass mo...
In our previous article we explored what Single Sign On (SSO) is, how it can benefit your business, and h...
The current digital landscape has developed at an alarming rate over recent years, and it has also felt a...
What’s New in Teams Displays? Microsoft Teams is constantly introducing new features and functionalitie...
Microsoft Teams makes Together mode available for all meeting sizes Microsoft is expanding the availabili...
Microsoft Teams’ activity feed now integrated with Power BI Microsoft Teams logo with shapes around...
Microsoft Teams personal and work/school can now run side-by-side People using Microsoft Teams on their P...
Microsoft Teams Mobile Apps Get Overdue Updates Microsoft has fired out some updates to its Teams iOS and...
7 New Features in Windows 11 Windows 11 is finally official after Microsoft’s big splashy Livestream. I...
Microsoft Teams is finally solving one of its biggest issues New Microsoft Teams chat bubbles looks to ke...
Vulnerability in Microsoft Teams granted attackers access to emails, messages, and personal files A vulne...
As we covered in our previous blog, the advancements in technology in the modern age have been enormous ...
The advancements in technology over the years has dramatically changed – and, most importantly, improve...
Microsoft has finally hinted toward a much-needed update to its Teams software. As revealed, Microsoft Te...
Microsoft Office for Android finally gets a dark mode Microsoft is finally adding a dark mode to its Offi...
You might want to ditch Chrome after seeing this update from Microsoft CHROME may remain the most popular...
Microsoft Teams now brings family and friends together to call, chat, and make plans For much of 2...
Microsoft Office 365 is getting a handy upgrade that will streamline your workflow Office apps will soon ...
3 Windows settings that you can reset to work more efficiently in Microsoft 365 You might be surprised to...
Employers should prepare for ongoing working from home, experts warn Organisations told they can ‘no lo...
Nearly all Microsoft 365 customers have suffered email data breaches 85% of Microsoft 365 business custom...
Browser wars: Microsoft Edge is showing the first signs of weakness Microsoft Edge Microsoft Edge, the...
Adobe Flash: Microsoft lays out plans to remove it from Windows 10 PCs for good Microsoft is preparing to...
Do you have applications that are essential to the way you and your team work but have become outdated? H...
Why organisations must learn from remote working impact James Pomeroy, Director of Quality, Health, Envir...
How to Enable Transcription in Microsoft Teams Microsoft Teams is the go-to solution for collaboration in...
Microsoft Teams looks set to be part of working life for years to come The past year has introduced many ...
Microsoft Announces Visual Studio 2022 Microsoft said today that it will release the first public preview...
Moving analytics to the cloud requires new approaches, skills, and architectures compared with analysis d...
As we have explored previously in the blog series, your Microsoft 365 account being breached could have p...
Now that we know smaller businesses are not immune to the threats that cyber criminals pose, it is essent...
Cyber security should be at the forefront of concerns for all business owners / managers, with Covid-19 r...
The video conferencing game could be hotting up even more after Microsoft Teams revealed it will be rol...
Top features of the easy-to-use collaborative software for businesses Formerly Office 365, Microsoft 365 ...
There can be no doubt that the last year has been unprecedented for businesses. The Covid-19 pandemic has...
Unless your business is big enough for its own IT department, outsourcing your IT may benefit your day-to...
Many businesses are already shifting a great deal of time and attention towards cloud-based technology. I...
In the previous blogs in the series, we have explored the ways in which cybercriminals attack your system...
In the last blog in the series, we explored cyber security and how it should be at the forefront of conce...
Cyber security has rapidly become a vital necessity to everyone. Anyone connected to the internet needs a...
Data breaches cost UK organisations an average of £2.9 million per breach. In 2019, human error acco...
90 per cent of cyber data breaches were caused by user error last year, according to the analysis of data...
A year after Prime Minister Boris Johnson started advising working from home where possible, Alex Dalglis...
Due to the impact of COVID-19, the number of people who work remotely has dramatically risen, meaning IT ...
New view switcher feature provides a different outlook on Microsoft Teams Users of Microsoft Teams migh...
Following a turbulent 2020, the stage is set for 2021 to become a year of growth and recovery. How can ma...
These six business technologies can help your company run smoother, gain and retain customers, improve ...
Cloud technology is not just growing quickly, it’s evolving! Pandemic has nudged many budding startups ...
As companies prepare to make remote working permanent, cultural change will play a crucial role in buildi...
The ongoing growth of cellular wireless network applications creates new demand for emerging technologies...
Microsoft on Monday announced it has started rolling out a guest access feature in Microsoft Teams. The...
BEFORE the Covid-19 pandemic, long-term trends such as the proliferation of new digital technologies, e...
Peter says that the cyber-attacks on his company are relentless. “We see tens of different hacking ...
Drive your business to IT confidence with the Cloud Problem: Organising meetings can be a difficult and i...
Drive your business to IT confidence with the Cloud A key ingredient to a successful business is collabor...
The transition into permanent remote working is inescapable now. Countless articles, morning talk shows...
With the UK’s third lockdown expected to last until at least March, the longer-term challenges of rem...
Scrutinize those SMS messages before you click. A new phishing campaign has been identified that targets...
Work communication platform could become as integral as an internet browser, says chief Satya Nadella. If...
If you’re one of the many currently working from home during the Covid-19 pandemic, read through th...
Britain’s earliest dinosaur was a nimble omnivore that ran around on two legs, unlike its later relativ...
A look at how remote life has accelerated connected technology Undoubtedly, connected technology is playi...
Business process automation and how it improves workflow in a customer service department. As we have exp...
Business process Automation and how it improves workflow in an accounts department. As we touched on prev...
Business Process Automation and how it improves workflow in a sales setting. The world in which business ...
There’s a false sense of security among the UK workforce, a new report states. There is a “false ...
A new report outlines key areas that could help businesses cut down on emissions. Businesses worldwide co...
The Covid-19 pandemic and the subsequent global lockdown have forced many businesses to shut down, but th...
A significant minority of businesses (31 percent) don’t have proper policies in place which would e...
Digital transformation lets the boldest banks reimagine themselves – and Temenos is powering the change...
Cloud computing will account for an even bigger chunk of enterprise tech spending over the next few year...
More and more, we see the cloud becoming a popular deployment option among organizations. The mobility an...
In the midst of a pandemic that’s led to unprecedented levels of remote working, digital tools to mon...
Venerable browser Internet Explorer continues to have millions of users worldwide, despite Microsoft acti...
When it comes to digital transformation, there’s a lot of attention on cloud computing and the i...
Identifying security trends via Windows 10 antivirus should be easier than ever Microsoft has unveiled ne...
Ways your remote working can be more effective through collaboration Collaboration is one of the most imp...
Ways Teams helps communications while remotely working Communication whilst remotely working is very impo...
5 Ways your remote working can be more effective Working from home or remote working poses a particular s...
FREE Microsoft 365 Subscription from Urban. Fuelled by the current climate, the demand for efficient and ...
Urban signs strategic partnership with flagship email security vendor, Mimecast With the changing trend i...
...
...
One of the key measures to reduce the spread of Coronavirus COVID-19 is social distancing, which for ma...
One of the key measures to reduce the spread of Coronavirus COVID-19 is social distancing, which for ma...
One of the key measures to reduce the spread of Coronavirus COVID-19 is social distancing, which for ma...
One of the key measures to reduce the spread of Coronavirus COVID-19 is social distancing, which for ma...
One of the key measures to reduce the spread of Coronavirus COVID-19 is social distancing, which for ma...
One of the key measures to reduce the spread of Coronavirus COVID-19 is social distancing, which for ma...
One of the key measures to reduce the spread of Coronavirus COVID-19 is social distancing, which for ma...
One of the key measures to reduce the spread of Coronavirus COVID-19 is social distancing, which for ma...
One of the key measures to reduce the spread of Coronavirus COVID-19 is social distancing, which for ma...
One of the key measures to reduce the spread of Coronavirus COVID-19 is social distancing, which for ma...
One of the key measures to reduce the spread of Coronavirus COVID-19 is social distancing, which for ma...
One of the key measures to reduce the spread of Coronavirus COVID-19 is social distancing, which for ma...
One of the key measures to reduce the spread of Coronavirus COVID-19 is social distancing, which for ma...
One of the key measures to reduce the spread of Coronavirus COVID-19 is social distancing, which for ma...
One of the key measures to reduce the spread of Coronavirus COVID-19 is social distancing, which for ma...
One of the key measures to reduce the spread of Coronavirus COVID-19 is social distancing, which for ma...
One of the key measures to reduce the spread of Coronavirus COVID-19 is social distancing, which for ma...
One of the key measures to reduce the spread of Coronavirus COVID-19 is social distancing, which for ma...
It is now becoming more important than ever to ensure your business is protected and certified against th...
One of the key measures to reduce the spread of Coronavirus COVID-19 is social distancing, which for ma...
One of the key measures to reduce the spread of Coronavirus COVID-19 is social distancing, which for ma...
One of the key measures to reduce the spread of Coronavirus COVID-19 is social distancing, which for ma...
One of the key measures to reduce the spread of Coronavirus COVID-19 is social distancing, which for ma...
One of the key measures to reduce the spread of Coronavirus COVID-19 is social distancing, which for ma...
One of the key measures to reduce the spread of Coronavirus COVID-19 is social distancing, which for ma...
How would you summarise the level of impact COVID-19 has caused to your business? Along with a var...
One of the key measures to reduce the spread of Coronavirus COVID-19 is social distancing, which for ma...
The cumulative volume of coronavirus-related email lures and other threats is the largest collection of a...
Organisations in the UK and Netherlands are more exposed to high-risk vulnerabilities than any others in ...
Security experts say a spike in email scams linked to coronavirus is the worst they have seen in years. &...
The email addresses and travel details of about 10,000 people who used free wi-fi at UK railway stations ...
(Image credit: GettyImages) A Virgin Media database containing the personal details of 900,000 people was...
(Image credit: Shutterstock) Hackers employed a clever trick to get users to enable macros in a malicious...
(Image credit: Shutterstock.com / Tharnapoom Voranavin) Employee and user data leaked due to unsecured se...
A new variant of the notorious Emotet Windows malware is able to spread wirelessly by brute-forcing Wi-Fi...
A new variant of the notorious Emotet Windows malware is able to spread wirelessly by brute-forcing Wi-Fi...
Software nasties targeted at MacOS are on the increase faster than ones for Windows, according to antivir...
Prolific malware turned botnet shows no signs of slowing down as campaigns are launched against financial...
The desktop platform of WhatsApp has more than 1.5 billion monthly active users. The flaw affected...
Remember the recent payment card breach at Wawa convenience stores? If you’re among those millions ...
The popular misconception that Macs don’t get viruses has become a lot less popular in recent years, as...
At least 200 people who were cheated out of more than $441,000 in total. To prevent yourself from falling...
According to the Google security team, the wave of fraudulent transactions began earlier this month. &nbs...
UK businesses were deluged with cyber-attacks in 2019, with the average firm hit by over half a million a...
WannaCry was “the most ordinary type of hack” in 2019 Despite some security analysts saying the is de...
Let us guide your business to the Fort of Cyber Security! Cyber threats are everywhere… It’s impo...
In the digital age, internet connectivity is as vital to our livelihoods as electricity. Despite being in...
We shouldn’t have to sit back and suffer… with the dangerous rate of attacks taking place, why should...
In the rise of threats to our valuable & private data, cyber-criminals are forever creating new ways to d...
After recently celebrating their 9th year in business, HallidayMarx enjoyed some exciting news that their...
Your details might be all over the Dark Web… what is it? Around 3% of the internet cordoned off typical...
Thieves are stealing from you… but, no longer are they climbing out of the bedroom window with your tel...
Thieves are stealing from you… but, no longer are they climbing out of the bedroom window with your tel...
On January 14th 2020 Microsoft will end extended support for the Windows 7 Operating System. This is know...
Disaster recovery and business continuity planning should be considered a critical aspect of running a bu...
Why backup and data protection is critical for a business? It is important to understand why backup is cr...
Why do you need an IT Security Checklist? According to the Government’s Cyber Security Breaches Survey ...
This blog outlines how to set up email redirect in Outlook and Outlook Web App (OWA) You can use Outlook ...
This blog outlines how to set up Outlook auto forward, including Outlook Web App. You can use Outlook Inb...
There are two ways to set up an email account on iOS. This blog will show you step by step how to set up ...
There are two methods to set up an Outlook Out of Office (Automatic Replies) when using Microsoft’s...
This month is a special month for Urban Network: our 15th anniversary! In 2003, our founders Perry and St...
Welcome to WordPress. This is your first post. Edit or delete it, then start writing!...
Imagine if you were hit with a major server failure… There’s no way to predict the future, and Mu...
Patch Management is one of the five key technical controls required in the UK Government-backed Cyber Ess...
Malware Protection is one of the five key technical controls required in the UK Government-backed Cyber E...
Access Control is one of the five key technical controls required in the UK Government-backed Cyber Essen...
Secure Configuration is one of the five key technical controls required in the UK Government-backed Cyber...
Boundary Firewall & Internet Gateway is one of the five key technical controls required in the UK Gov...
Over the past 12 months, we were busy producing useful blog content for our amazing audience of social fo...
What should business look for in their Outsourced IT Provider? One of the hardest decisions any business ...
The General Data Protection Regulation (GDPR) replaces the Data Protection Act (DPA) in May 2018. It prov...
We are proud to announce that Urban Network have achieved the Information Assurance for Small and Medium ...
Mayday was growing rapidly, nearly double its size and turnover since last year. It soon realised that th...
More than 90% of targeted attacks start with email as cybercriminals look to gain access to your organisa...
We are delighted to announce that Urban Network have been named B2B Reseller of the Year at the annual Ne...
Customer at a Glance 21construction Industry Construction Size Over 35 users Website http://www.21constru...
Today there are so many great ways to learn and improve your business; you can read blogs, attend webinar...
We are finalist in the 2017 Network Group Awards! We are delighted to announce that Urban Network have re...
Windows Vista End of Support is coming next month on April 11, 2017. What “End of support” means for ...
Read on and you will find more interesting facts about our Managing Director. 1. How long have you been a...
Customer at a Glance Jackson Stops & Staff Industry Property Management Size Over 150 users across 13...
Are you prepared in the event of data loss, natural disaster, cyber-attack, hardware failure or human err...
You may have heard of Moore’s Law which is an observation of the speed in the advancement of comput...
Today’s big IT advantages come with major risks. Your networks and systems serve as your silent partner...
Our Desktop Assistant, Monitoring & Automation tool – Sentinel is getting an upgrade, new code ...
Urban Network has been announced as the winner of Customer Service Award at the Thames Gateway Business A...
Security breached are costly and rarely a day goes without you seeing a headline about a new data breach....
A strong password is your first defence against hackers and cyber criminals. This month is Cyber Security...
In 2015, we observed an increase of macro-based malware along with the spike in spam volume. The majority...
There are numerous ways to spot a fake email. The list below is not exhaustive but covers most common typ...
The World Wide Web is a wonderful thing, never has it been so easy to find information, research your fav...
What is Malvertising? Malvertising, short for malicious online advertising, is a combination that describ...
In some cases, cybercriminals may have managed to gain access to systems belonging to somebody that you k...
What is Phone Phishing, Voice Phising or Vishing? Phone Phishing or Vishing (short for Voice Phishing) is...
What is Spear Phishing? Spear Phishing is a form of Social Engineering. It may be defined as ‘highly ta...
What is Phishing? Phishing is the most popular form of Social Engineering. Via email mainly, this describ...
What is Social Engineering? When the term ‘Social Engineering’ is used in the context of cybersecurit...
We are excited and proud to announce that we’ve been selected as finalist in this year’s Thames Gatew...
The reality is that EVERY business and individual are at risk from cybercrime and awareness is perhaps th...
As many of our clients may know, Urban Network are proactive in helping community and charity as part of ...
Slow computers are the bane of most people’s existence and can put anyone in a bad mood. Luckily our te...
In the last edition of CompTIA “Spotlight on Success” blog series, our CEO Perry Ashby, a mem...
We are delighted to announce that Urban Network has obtained the Sophos Managed Service Provider (MSP) Co...
Here at Urban Network, we offer a full range of services, and these include physical cabling within our c...
Do you know we watch 4000 hours of movies a month? Sort of… Who’s our favourite politician? What ...
We are pleased to announce that Perry Ashby, CEO of Urban Network has been elected to CompTIA’s UK Chan...
WE MADE IT!! Woohooo! We are excited to announce that Urban Network won Silver Award at the Essex Digital...
This April the Urban Network team will head to the annual Sophos Partner Conference and Global Awards cer...
Your business can’t afford without protection, especially when the threats of downtime is all aroun...
We are delighted to announce that Urban Network have been nominated as finalists in this year’s Net...
Most companies have decided they need the business agility and want the cost savings that come when movin...
On the occasion of the National Apprenticeship Week 2016, Urban Network co-founders Perry and Stuart shar...
We are very excited and proud to announce that we’ve been selected as finalist in this year’s Essex D...
As a guess, half of your employees love the file server, since it is fast, easy, and centralises all work...
Kelvin has been with Urban Network for over a year as a Helpdesk Analyst apprentice. Today, he shares his...
Love it or hate it, the Cloud is now ever-present in corporate life. It is now commonplace for businesses...
Virtually every employee today has a smartphone. Many also have tablets, such as iPads and Android device...
At Urban Network, we are extremely proud of our smart and talented people. We will introduce a new blog s...
London, UK, October 6, 2015 – Urban Network, a London-based Managed Service Provider announced today it...
Our customer is a London based transformation consultancy, providing business coaching, executive placeme...
The World’s Biggest Coffee Morning is Macmillan Cancer Support’s biggest fundraising event wh...
Broadband Connection Vouchers are being delivered by 50 cities across the UK. Each local scheme is desi...
Miz is our Helpdesk Analyst apprentice and has been with Urban Network for more than a year. Today, he sh...
London – June 30, 2015 – Urban Network, a London-based IT Managed Service Provider has today anno...
Make your Mac users more productive with Office 2016 for Mac. Office works great across multiple devices ...
Last week, our CEO Perry Ashby attended “It’s a Knock Out!” Summer Fun event at Ardenco...
After July 14, Microsoft will no longer issue security updates for any version of Windows Server 2003. If...
It’s National Apprenticeship Week, time to celebrate apprenticeships and the positive impact they h...
Urban Network recently delivered a fully managed WiFi system to one of our clients in the hospitality sec...
The Urbanites are making the world better with a sweater this Friday! Christmas Jumper Day is an annual f...
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |