View O2 Data Outage

O2 Data Outage

Dear Modern Networks Customers: We are aware that 02 mobile and data provider customers are unable to use data this morning. One of O2’s third party suppliers has identified a global software issue in their system, which has affected O2’s data services. We believe other mobile operators around the world are also affected. We are…

Read More


View Buy or lease your next business computer?

Buy or lease your next business computer?

As a Building Manager or Facilities Manager working in the commercial property sector, you are always juggling priorities and trying to squeeze the last drop of value from your limited budget. Keeping on top of a hundred and one tasks requires you have a decent, business-grade computer. However, the costs of a new computer, software…

Read More


View The Naked Service Desk at SITS 2018

The Naked Service Desk at SITS 2018

About a year ago, I wrote a blog called ‘The Naked Service Desk’. It described the ten key elements of a brilliant service desk. The title was a bit of a joke, designed to grab people’s attention but it also explained the nature of the content pretty well: stripping back the service desk to its…

Read More


View GDPR and cyber security readiness

GDPR and cyber security readiness

Media hype around GDPR (General Data Protection Regulation) has produced considerably more heat than light. GDPR is the European Union’s replacement for things like the UK’s Data Protection Act (1998). The new regulations come into effect 25th May 2018. All companies wishing to trade with the EU must be GDPR compliant. The UK will adopt…

Read More


View What can shopping centres learn from Las Vegas?

What can shopping centres learn from Las Vegas?

Online shopping has changed retail forever. Today’s consumers are more demanding, and have more choice than ever before. In order to stay relevant, drive growth and boost efficiency, shopping centres must invest in the right technologies to create the ideal shopping and leisure experience. Digital strategy Traditionally, commercial property could be described as a “non-digital…

Read More


View How good is your cyber security, really? Get a Network Security Audit

How good is your cyber security, really? Get a Network Security Audit

Hitchin, UK, February 2018 – Today, a data breach, ransomware attack or IT systems failure can seriously damage an organisation’s ability to operate. It can even cause organisations to close down. However, surprisingly few organisations take even rudimentary precautions to protect their IT infrastructure and valuable data. Instead, they use weak passwords, share user privileges,…

Read More


View Cyber Essentials certification

Cyber Essentials certification

Cyber Essentials certification for Modern Networks Modern Networks is pleased to announce that we have gained our Cyber Essentials certification for 2018. Introduced by the UK Government in 2014, the Cyber Essentials scheme is designed to help organisations better protect themselves from the most common cyber threats. Cyber Essentials certification has a number of benefits,…

Read More


View The little book of network security available now

The little book of network security available now

Hitchin, UK – According to Government statistics, half of all UK businesses suffered a data breach or cyber attack in the past 12 months. It’s estimated that cyber crime cost UK businesses a staggering £34.1 billion during 2016. The reason cyber crime has reached such epidemic proportions is easily explained: profit. The average ransomware attack…

Read More


View Cisco Adaptive Security Appliance (ASA) vulnerability

Cisco Adaptive Security Appliance (ASA) vulnerability

On the 29th January 2018, Cisco published a security vulnerability alert concerning their Adaptive Security Appliance (ASA) software. Cisco ASA is a security device that combines firewall, intrusion prevention, and virtual private network (VPN) capabilities. It provides proactive threat defence that stops attacks before they spread through an IT network. The identified vulnerability in the…

Read More


  1. Pages:
  2. 1
  3. 2
  4. 3