Welcome to Urban Network’s blog

Stay up to date with our most recent news and updates

Cyber Essentials 101 – Malware Protection

Malware Protection is one of the five key technical controls required in the UK Government-backed Cyber Essentials Scheme. Why Malware Protection is important? An organisation should implement robust malware software on devices that have access to or are accessible...

Cyber Essentials 101 – Access Control

Access Control is one of the five key technical controls required in the UK Government-backed Cyber Essentials Scheme. Why Access Control is important? This control aims to ensure that only authorised individuals have user accounts and have access and at the...

Cyber Essentials 101 – Secure Configuration Control

Secure Configuration is one of the five key technical controls required in the UK Government-backed Cyber Essentials Scheme. Why Secure Configuration is important? A new computer, network devices or installed software cannot be considered secure upon default...

Cyber Essentials 101 – Boundary Firewall Internet Gateway

Boundary Firewall & Internet Gateway is one of the five key technical controls required in the UK Government-backed Cyber Essentials Scheme. Why Boundary Firewall and Internet Gateway is important? This control applies to every business where employees have access to...

IT Industry Events To Check Out in 2018 – Come and Meet Us

Want to meet us? We want to meet you too! We are attending quite a few IT industry events over the next few months. Come and meet the Urban Network team members at the following trade shows, conferences and exhibitions in 2018. January - BlockChain Week, January...

9 most popular posts of 2017

Over the past 12 months, we were busy producing useful blog content for our amazing audience of social followers, email subscribers, customers, and customers-to-be. Didn't have time to read it all? Here are the top 9 most popular posts of 2017. #1 - What General Data...

[Checklist] What to look for when choosing an Outsourced IT Provider

What should business look for in their Outsourced IT Provider? One of the hardest decisions any business needs to make is who their partners will be. This is especially true when it comes to technology partnerships, as they can become integral to everything you do as...

Support for Office 2007 including Outlook ends in October 2017

Microsoft is ending extended support for Office 2007 including Outlook 2007 this October. After October 10, 2017, Office 2007 users will no longer receive technical support and updates, including security patches or bug fixes. Office 2007 programs like Word, Excel or...

Urban Network achieves IASME GOLD Accreditations

We are proud to announce that Urban Network have achieved the Information Assurance for Small and Medium Enterprises (IASME) Governance Gold standard in addition to our existing Cyber Essentials accreditation. About the IASME Governance standard The IASME Governance...

[Case Study] Mayday Managed IT Support Service Success Story

Mayday was growing rapidly, nearly double its size and turnover since last year. It soon realised that the existing IT system and infrastructure were not sufficient to keep pace with its growth. They were starting to search for a flexible IT partner who...

Email Security with Office 365 Advanced Threat Protection

More than 90% of targeted attacks start with email as cybercriminals look to gain access to your organisation. With sophisticated cyber attacks on the rise, your email security must keep up. Microsoft is continuing to wage on war on phishing attacks and email scam...

Page 2 of 712345...Last »