News
Cybersecurity Metrics That Matter
One of the most challenging aspects of cybersecurity is translating technical metrics into business-relevant insights that resonate with the board. While your day-to-day involves addressing complex cyber threats and [...]
Read moreNews
Why People Are Your Biggest Risk—and Asset when it comes to Cybersecurity
Cybersecurity is often seen as a technical domain, with much of the focus on firewalls, encryption, and the latest software to guard against external threats. However, the reality is [...]
Read moreNews
The Importance of Testing, Leadership Buy-In, and Trusted Partnerships
Creating a cybersecurity culture means embedding security practices into the very fabric of your organisation.
Read moreNews
Establishing a Strong Cybersecurity Culture
Creating a cybersecurity culture means embedding security practices into the very fabric of your organisation.
Read moreNews
Understanding Threat Intelligence
Threat intelligence is more than just a collection of data points; it is the strategic gathering and analysis of information about potential or existing threats targeting your organisation or [...]
Read moreNews
The Future of Passwords
The digital landscape is evolving rapidly, and one significant shift on the horizon is the move towards passwordless authentication. For years, passwords have been a necessary yet frustrating part [...]
Read moreNews
The Benefits of Partnering with a Managed Security Service Provider
Partnering with a Managed Security Service Provider (MSSP) can offer a strategic solution to security management .
Read moreCase Study
Case Study: Benefits of Adopting Managed Security Services (MSS)
A highly recognised insurer and reinsurer based in London, renowned for their expertise in Casualty, Marine, and Property lines, along with other specialist areas.
Read moreNews
Organisational Resilience
The importance of cybersecurity cannot be overstated—organisations face increasingly sophisticated cyber threats that have the potential to disrupt operations, compromise sensitive data, and erode consumer trust.
Read moreNews
The Importance of Data Backup and Recovery
Data breaches and ransomware attacks can have catastrophic effects on business operations. They can lead to loss of sensitive information, disruption of services, financial losses, and reputational damage.
Read moreNews
Unknown or Unmanaged Devices Used by Administrators
The Cyber Security Operations Centre (CSOC) frequently deals with alerts triggered by routine administrative changes, such as mailbox updates and user configuration modifications. When administrators use unknown or unmanaged [...]
Read moreNews
The latest cyber-attack trend: Malicious PDF Link Obfuscation
Cyber attackers constantly seek new ways to trick users into granting access to their accounts. When a method proves effective, it often becomes more widespread in the hopes of [...]
Read moreNews
QR Codes in Spreadsheets and Office Documents
While this method isn’t new, it remains a prevalent phishing tactic. It works by diverting users away from their secured devices, prompting them to scan and log in via [...]
Read moreNews
Enhancing digital defences with Multi-Factor Authentication
Multi-Factor Authentication (MFA) is a crucial layer of cyber security, yet many organisations find the implementation process both challenging and frustrating.
Read moreNews
Conducting a Comprehensive Security Audit
Protecting your IT infrastructure from cyber threats is crucial. For medium-sized enterprises, a security breach can lead to significant financial losses, legal repercussions, and damage to reputation. Conducting a [...]
Read moreNews
Enhancing Cybersecurity Through External Partnerships
In today's digital landscape, the sophistication of cyber threats is constantly evolving. Organisations face the daunting task of staying ahead of these threats to protect their assets and data. [...]
Read moreNews
Microsoft Introduces Mandatory MFA to Strengthen Azure Security
As cyberattacks become more frequent, sophisticated, and damaging, protecting your digital assets has never been more vital. In line with Microsoft's $20 billion investment in security over the next [...]
Read moreNews
Monitoring evolving DDoS trends is crucial for anticipating threats and updating defensive strategies
The Gcore Radar Report for the first half of 2024 offers a detailed analysis of DDoS attack data, highlighting shifts in attack patterns and the broader cyber threat landscape. [...]
Read moreCase Study
Case Study: Upgrading Compute Infrastructure for Leading Insurer
A highly recognised insurer and reinsurer based in London, renowned for their expertise in Casualty, Marine, and Property lines, along with other specialist areas.
Read moreNews
Embracing AI in Business
In the rapidly evolving business landscape, AI is revolutionising operations, enhancing customer experiences, and fostering innovation.
Read moreNews
Maximising Operational Efficiencies with Advanced IT Security
In today's digital age, enterprise decision-makers face the daunting challenge of integrating a range of technologies, from SD-WAN to unified communications as a service (UCaaS), to boost operational efficiencies.
Read moreNews
The true value of insurance
The true value of insurance often becomes clear only when it is needed. Premiums and coverage details might seem mundan, yet they transform into a lifeline during crises. Good [...]
Read moreNews
Paris 2024 Olympics – Anticipating and Mitigating Threats
As the 2024 Paris Olympics commence, cybersecurity teams are on high alert due to the significant increase in potential cyber threats.
Read moreNews
One Year of Ice Showers: Transformative Experiences, Growing Children, and Evolving Cybersecurity in Business
One year ago, I embarked on an unusual journey: the ice shower challenge! Every day, I would step under a freezing cold shower for as long as I could [...]
Read moreNews
Shaping the Future with AI-Driven Cloud Solutions
Throughout history, the right tool in the right hands has always led to transformation. Today, AI marks the next significant shift, already impacting individuals, business functions, and entire industries.
Read moreNews
Strategies for Mitigating Organisational Cybersecurity Risks
In today's rapidly evolving digital landscape, the significance of robust cybersecurity measures cannot be overstated. As an IT Leader you are tasked with safeguarding your organisation against an ever-growing [...]
Read moreNews
Why Integrated Threat Protection is Crucial for Modern Enterprises
In the current digital landscape, enterprises face increasingly sophisticated cyber threats. The traditional method of using numerous separate security tools is proving ineffective, often resulting in fragmented visibility and [...]
Read moreNews
5 Effective Strategies for Mitigating Phishing Attacks
Phishing remains a pervasive threat in the digital landscape, impacting a wide array of organizations. According to a 2023 study conducted by the UK government, phishing attacks constituted a [...]
Read moreNews
Strengthening Cybersecurity: Embracing the Zero Trust security model
There is no doubt that cyber security is an essential concern for all businesses. Cyber-attacks are increasingly common, costing companies time, money, and reputational damage. All companies, regardless of [...]
Read moreNews
Modern Endpoint Management
Have you been struggling with the challenges that come with device deployment and endpoint management in today’s world of the hybrid workforce and the rise of bring-your-own-device (BYOD)? • [...]
Read moreNews
Connect – Communicate – Collaborate
With a cost-reducing cloud communication platform. We’ve done the hard work for you and analysed the top 13 cloud communication providersfrom the Gartner Magic Quadrant. Download here and we’ll [...]
Read moreNews
Inside the Trends Driving Top Cloud Startups In 2023 (forbes.com)
Last year, U.S. Federal Reserve took the punch bowl away from the financial markets, putting an end to the easy money and stratospheric valuations in the venture capital (VC) and [...]
Read moreNews
The 3 Keys to Building a Great Workplace Experience
What makes a place a great place to work? Is it perks, competitive salary, your own wooden panelled south facing office? Apparently not…recent research has confirmed the 3 keys [...]
Read moreNews
Dramatic Collaboration
The extent to which we’re collaborating is dramatic and very much now normal. Our personal experiences, videos, photos, weight loss objectives, home projects or simple video chat – our [...]
Read moreNews
The Diary of an IT Partner
Fresh and ready to kick off 2019 whilst the vendor world are packing their suitcases and heading off to their fancy sales conferences in Vegas, I’m in our Paddington [...]
Read more