View The dangers of using personal mobiles for work

The dangers of using personal mobiles for work

Today, more people are working remotely than ever before. As a result, many employees are working on their own personal devices. However, research shows that fewer than half of organisations have a BYOD (Bring Your Own Device) security policy in place to safeguard work-related data that resides on personal mobiles. In this article, we look…

Read More


View When disaster strikes will your commercial property weather the storm?

When disaster strikes will your commercial property weather the storm?

When disaster strikes, will your commercial property weather the storm? In this article, we have briefly outlined the things you need to consider when choosing a data backup solution, and how to create your own disaster recovery plans. To help you get to grips with the basics, we have also created a handy infographic that…

Read More


View Is your data backup creating a false sense of security?

Is your data backup creating a false sense of security?

Since the start of the Covid-19 pandemic, the world has seen a massive increase in cyber-crime. Attacks against banks and financial institutions, for example, are up 238%. No one is immune. Cyber-attacks against schools, hospitals and other public institutions have skyrocketed. Just one-hour’s downtime can cost the average medium-sized business over £60,000. The ability to…

Read More


View Keep your data safe when staff use their own devices

Keep your data safe when staff use their own devices

In the rush to get your staff setup for working from home, did anyone stop to check how safe your company data would be? Because suddenly having your people access your data via lots of different devices, introduces lots of new variables. Especially if your team are using their own laptops, tablets or mobiles. This…

Read More


View Connected toys to smart buildings, the pros and cons of IoT

Connected toys to smart buildings, the pros and cons of IoT

It’s nearly Christmas, and many of us will find smart, Internet-enabled gadgets under the tree. In fact, by year’s end a staggering 27 billion connected consumer devices will have been sold world-wide.1 From doorbells and CCTV cameras to virtual assistants and household appliances, everything is getting smarter and going online. However, the more connected devices…

Read More


View Cyber security services

Cyber security services

Today, no one can afford to ignore the threat from cybercrime. The first step in protecting yourself from cyber threats is to understand where you are vulnerable. Next, you need a defence-in-depth approach to your security. This means training your staff to recognise and respond to common threats. You need clear processes and procedures to…

Read More


View Secure printing top tips infographic

Secure printing top tips infographic

When it comes to IT security, many businesses simply overlook their network-connected printers and copiers. An unsecured printer is a backdoor into your network just waiting to be exploited. Modern Networks provides IT, telecoms and printers as a managed service. Here are our top 10 tips to help you secure your business printers.

Read More


View Printer security

Printer security

Hacker’s backdoor At the end of 2018, around 100,000 businesses across the world had their printers hijacked by a mysterious hacker called Giraffe. The hacker forced printers to create posters supporting Swedish YouTube star Felix Arvid Ulf Kjellberg also known as PewDiePie. The hack took less than half an hour to perform and was executed…

Read More


View Security first

Security first

The technology landscape is always changing. Its inhabitants evolve and predators adapt. In order to survive, organisations and individuals must adopt a security first mentality. For organisations, security cannot be an afterthought. Instead, it must be planned and built into the fabric of your IT infrastructure. You also need clear security policies that are regularly…

Read More


  1. Pages:
  2. 1
  3. 2