View Nine actions to safeguard your mobile

Nine actions to safeguard your mobile

The statistics vary but around 80% of people use a personal mobile device at work. Many employees use personal mobile devices for work purposes whether their employer knows it or not. In this article, we take a brief look at the pros and cons of BYOD, and suggest nine actions you can take to safeguard…

Read More


View Is your data backup creating a false sense of security?

Is your data backup creating a false sense of security?

Since the start of the Covid-19 pandemic, the world has seen a massive increase in cyber-crime. Attacks against banks and financial institutions, for example, are up 238%. No one is immune. Cyber-attacks against schools, hospitals and other public institutions have skyrocketed. Just one-hour’s downtime can cost the average medium-sized business over £60,000. The ability to…

Read More


View Are you prepared for the end of lockdown?

Are you prepared for the end of lockdown?

So the UK lockdown is still in force right now. But have you started planning yet, for when your staff can return to the workplace? Are you prepared for the end of lockdown? It’s going to happen at some point soon. And the more you plan and act now, the easier it will be. There…

Read More


View Keep your data safe when staff use their own devices

Keep your data safe when staff use their own devices

In the rush to get your staff setup for working from home, did anyone stop to check how safe your company data would be? Because suddenly having your people access your data via lots of different devices, introduces lots of new variables. Especially if your team are using their own laptops, tablets or mobiles. This…

Read More


View How to work remotely, stay productive, stay secure

How to work remotely, stay productive, stay secure

The coronavirus (Covid-19) outbreak is already having a dramatic impact on all our work and family lives. During these uncertain times, technology is helping keep the economic wheels turning. One of the immediate outcomes of the crisis has been many people working from home, slowing the spread of the virus. In this article, we will…

Read More


View Connected toys to smart buildings, the pros and cons of IoT

Connected toys to smart buildings, the pros and cons of IoT

It’s nearly Christmas, and many of us will find smart, Internet-enabled gadgets under the tree. In fact, by year’s end a staggering 27 billion connected consumer devices will have been sold world-wide.1 From doorbells and CCTV cameras to virtual assistants and household appliances, everything is getting smarter and going online. However, the more connected devices…

Read More


View Press release: Security Awareness Training

Press release: Security Awareness Training

Nine out of ten successful cyber-attacks start with a phishing email. Cybercriminals use sophisticated social engineering techniques to dupe unwary members of staff into opening malicious email attachments or clicking on bad links. According to a recent Datto survey, one in five SMBs has fallen victim to a ransomware attack. That same survey found that…

Read More


View Commercial property: cyber security checklist

Commercial property: cyber security checklist

Today, more and more commercial properties are adopting smart technologies to improve energy efficiency, monitor equipment, automate routine maintenance and collect data. Similarly, Space-as-a-Service tenants’ demand access to the latest IT and telecommunications. Of course, more technology demands better safeguards against cyber-attacks. Property firms must also “take appropriate security measures” to meet data protection obligations….

Read More


  1. Pages:
  2. 1
  3. 2