fbpx

Shadow IT – 5 steps to take back control of your data

Blog The world is going digital, are you on board…

A few months ago, I received what appeared to be a random electronically generated mailshot from the Inland Revenue. Given what we do for a living I am naturally suspicious of most communications proposing to be from these guys, but this one was different. The mailshot was to prepare me for next year’s payroll year […]

Read more
Blog Next level stuff and you need to be on board…

Next level stuff and you need to be on board… So, month 8 in the covid-19 household and it feels a bit like Groundhog Day if I am honest. Home working is most definitely here to stay, leaving us all wondering what the best way is to keep remote employees in the loop of all […]

Read more
Blog Using artificial intelligence to fight cybercrime

Artificial intelligence is providing us with advances in all areas, but how does it relate to cybercrime? Well, let’s have a chat about it. Here is one of those classic “it makes sense but doesn’t work moments”. If I wanted to design the best home security system, then sensibly, I should go to the Police […]

Read more
Blog What is a ransomware attack and how does it happen?

What is a ransomware attack? We’re all hearing about the growth in cyber attacks and how its not an “if” but a “when” situation and there’s words banded around all over the place which leads many to ask what is a ransomware attack? A ransomware attack usually involves cyber criminals gaining access to your data […]

Read more
Blog You can for sure, fool some of the people some of the time.

In this first of a series of articles, let us share some insight around all things ‘social engineering’. Firstly you need to know what it is. Put simply social engineering is the act of tricking someone into divulging information or taking action, usually via technology. It’s a simple idea, intended to take advantage of a […]

Read more
Blog Top Tips for keeping your system secure

When it comes to keeping your system secure , protecting your client data, your reputation, and your users, then the need to have a focus on “all things best practice“ around IT security cannot be overstated. Whilst your IT partner can offer all sorts of practical advice guidance and solutions, each business needs to take […]

Read more