News

In the digital age, internet connectivity is as vital to our livelihoods as electricity. Despite being in the country’s capital, you might still be suffering from a lack of full fibre broadband, which is holding back the productivity of your business and is ultimately costing...

Thieves are stealing from you… but, no longer are they climbing out of the bedroom window with your television. Today’s cyber criminals want to get access to your valuable & sensitive data, and with some slightly more sophisticated tools at their disposal...

On January 14th 2020 Microsoft will end extended support for the Windows 7 Operating System. This is known in tech terms as end-of-life for the software. So, what does this mean and how do you prepare for Windows 7 End of Life?...

[et_pb_section bb_built="1" _builder_version="3.0.100" next_background_color="#000000"][et_pb_row][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.106" background_layout="light"] Disaster recovery and business continuity planning should be considered a critical aspect of running a business. These 7 key principles of Business Continuity will help you get started in the right direction when crafting an effective business continuity plan. [/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row...

[et_pb_section bb_built="1" _builder_version="3.0.100" next_background_color="#000000"][et_pb_row _builder_version="3.0.100" padding_bottom_1="0px" custom_padding="||0px|"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.106" custom_padding_last_edited="on|desktop" background_layout="light" header_2_font="|600|||||||" header_2_font_size="20px" header_2_text_color="#0c71c3"] Why backup and data protection is critical for a business? [/et_pb_text][et_pb_text _builder_version="3.0.106" background_layout="light"] It is important to understand why backup is critical for a business. Today’s businesses are creating more data than ever and you...

[et_pb_section fb_built="1" _builder_version="3.22"][et_pb_row _builder_version="3.25" custom_padding="||0px|"][et_pb_column type="4_4" _builder_version="3.25" custom_padding="||0px|" custom_padding__hover="|||"][et_pb_text _builder_version="3.27.4" header_2_font="|600|||||||" header_2_text_color="#0c71c3" header_2_font_size="20px" custom_padding_tablet="" custom_padding_phone="" custom_padding_last_edited="on|desktop"]Why do you need an IT Security Checklist? [/et_pb_text][et_pb_text _builder_version="3.27.4"]According to the Government’s Cyber Security Breaches Survey 2017: 46% of all UK businesses identified a cyber security breach or attack in...

[et_pb_section bb_built="1" next_background_color="#000000"][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|phone" background_layout="light"] Patch Management is one of the five key technical controls required in the UK Government-backed Cyber Essentials Scheme. [/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|desktop" background_layout="light" header_2_font="|600|||||||" header_2_font_size="20px" header_2_text_color="#0c71c3"] Why Patch Management is important? [/et_pb_text][et_pb_text _builder_version="3.0.92" background_layout="light"] Vulnerabilities or security flaws are common in...

[et_pb_section bb_built="1" next_background_color="#000000"][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|phone" background_layout="light"] Malware Protection is one of the five key technical controls required in the UK Government-backed Cyber Essentials Scheme. [/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|desktop" background_layout="light" header_2_font="|600|||||||" header_2_font_size="20px" header_2_text_color="#0c71c3"] Why Malware Protection is important? [/et_pb_text][et_pb_text _builder_version="3.0.92" background_layout="light"] An organisation should implement robust malware software...

[et_pb_section bb_built="1" next_background_color="#000000"][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|phone" background_layout="light"] Access Control is one of the five key technical controls required in the UK Government-backed Cyber Essentials Scheme. [/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|desktop" background_layout="light" header_2_font="|600|||||||" header_2_font_size="20px" header_2_text_color="#0c71c3"] Why Access Control is important? [/et_pb_text][et_pb_text _builder_version="3.0.92" background_layout="light"] This control aims to ensure that only...