Blog

Category: Cyber Security

What is Shadow IT?

What is Shadow IT?

You’ve probably heard the phrase Shadow IT before, but what is it? What does it actually mean,...

The history of Microsoft Defender for Business

The history of Microsoft Defender for Business

When considering the Microsoft suite of products, most people have heard the name Defender as itR...

Business benefits of Secure Device Management solutions

Business benefits of Secure Device Management solutions

Maintaining the overall security of personal and organisational devices is crucial for every organis...

Cyber Essentials 2022 Major Updates Businesses Need to Know

Cyber Essentials is a government backed scheme which was launched in 2014 to allow enterprises to pr...

Cyber Security tactics in a Post-Pandemic world

In March 2020, the UK along with the rest of the world was placed in lockdown due to Covid 19. Busin...

Modern Workplace Security – A Three Pillared Approach

In the traditional IT world, the edge of an organisation’s network, or rather it’s firew...

Cyber Risk in the Finance Sector within a Post Pandemic World

There is no doubt that the financial sector has become the most prevalent target for cyber security ...

Cyber Security Risk Mitigation Checklist

With employees, customers and partners all working from multiple locations on a multitude of persona...

The Top Cyber Security Frameworks

Gartner challenges business to focus on security projects that drive the most business value and red...

Protect Your Business From Toll Fraud

What is toll fraud? Toll fraud is a highly organised, illegal type of telephone fraud where business...

5 Tips to Improve Cybersecurity for Your Business in 2021

The changes in our technology landscape have been significantly altered by the pandemic, however, de...

Securing your Remote Workforce

YouGov recently reported that 46% of the UK workforce now work from home at least some of the time e...