Blog

19th May 2022
Your 2022 guide to migrating SQL Server to Microsoft Azure
As Microsoft SQL Server 2012 is reaching its end of life on July 12, 2022, businesses still using ...
19th May 2022
What more can your business do to combat ransomware?
From small local businesses to large international enterprises, all businesses are at risk of falling ...
11th May 2022
Business Process Automation: The current state of automation in 2022
Throughout history, businesses have constantly looked for ways to automate processes, to save time and ...
11th May 2022
Benefits and challenges of outsourcing IT services
Due to a number of factors, including the current digital skills shortage, many businesses have ...
6th May 2022
Why a Cyber Essentials certification is important for SMBs
In recent years, it has become increasingly important for businesses to secure their IT systems ...
6th May 2022
How your business can make the most of the modern workplace
Throughout history, the concept of an ideal workplace has constantly evolved, from the Action Offices ...
29th Apr 2022
The role passwords play in a world of cybercrime
For businesses, one weak password can be the cause of a major cybersecurity incident. For ...
14th Mar 2022
5 Types of Phishing Attacks (and How to Avoid Them)
Phishing attacks are a form of social engineering where a cybercriminal imitates a trusted entity ...
22nd Feb 2022
Why your business needs a disaster recovery plan
There are many risks to a UK business data including hardware malfunctions, human error, natural ...
11th Feb 2022
Passwordless Authentication: Benefits, Challenges and Deployment Options
Poor password hygiene remains a key security weakness for many businesses. All employees know that ...
2nd Feb 2022
How to create a comprehensive security ecosystem
Just as the way businesses use technology has changed over the past 5 years, so too ...
11th Jan 2022
Key challenges of endpoint security
The rise of hybrid working has forever changed how businesses must view their security posture. ...
14th Dec 2021
The 6 worst cyberattacks of 2021
2021 has been a year of digital transformation for all businesses. The widespread adoption of remote ...
1st Dec 2021
What to do if you fall victim to a cyberattack
Between 2020 and 2021, 4 in 10 businesses and a quarter of charities reported some form of cybersecurity breach ...
23rd Nov 2021
Why businesses should implement single sign-on (SSO)
Businesses typically have subscriptions to many different cloud services, including everything from Microsoft 365 products to ...
2nd Nov 2021
Key Cybersecurity Considerations for the Construction Sector
All industries have undergone a period of digital transformation over the past two decades. The ...
26th Oct 2021
Mobile Device Security: 5 common mobile device security threats
As the cybersecurity threat landscape continues to grow, most businesses have been working to improve ...
24th Aug 2021
SMB Cybersecurity: 6 ways small businesses can stay secure
With the prevalence of cybersecurity attacks, all businesses are at risk of a cyberattack, regardless ...
28th Jun 2021
4 Reasons why you should enable Multifactor Authentication on Microsoft 365
70% of individuals lack a high degree of confidence that their passwords can adequately protect their ...
24th May 2021
6 ways to improve your IT security and avoid a ransomware attack
The recent ransomware attacks on the Irish Health Service show that, regardless of size or ...
26th Apr 2021
How do you protect against phishing attacks?
Phishing attempts are so common now that you’d be hard pressed to find an ...
22nd Mar 2021
5 lessons to be learned from 2020 security breaches
It’s an undoubted fact that the global pandemic of 2020/21 will leave businesses operating in ...
11th Jan 2021
What financial services sector needs to know about cybersecurity
Financial services companies contribute £130 billion per year to the UK economy. A huge bucket of ...
29th Dec 2020
Non-profits: how to do cyber-security the right way
Non-profit businesses hold a wealth of funds and valuable data that make them an enticing ...
7th Dec 2020
Do you know how hackers attack?
The workplace has transformed rapidly over the past ten years, as enterprises look to take ...
2nd Nov 2020
Penetration testing: a huge asset for small businesses?
Penetration testing, also known as pen testing or ethical hacking, has become an increasingly popular ...
29th Oct 2020
Do you know how to identify a sophisticated email scam?
In April 2020, Google reported blocking over 18 million coronavirus scam emails daily. When you take regular ...
19th Oct 2020
Why Microsoft Azure is the way forward for SMBs
There is much talk in the tech and general media about how cloud computing is ...
7th Jul 2020
How to protect yourself against webcam hijacking
Your home should be a secure sanctuary but with the rise in Internet of Things ...
2nd Jan 2020
How to protect your business from zero-day threats
Are you worried about cyber threats to your business and so-called zero-day threats? Or do ...
15th Nov 2019
Cybersecurity threats that have impacted businesses in 2019
Cybersecurity is a hot topic for businesses and one that needs to be taken seriously. ...
4th Nov 2019
7 benefits of using a managed service provider
One of the most popular methods for businesses when it comes to outsourcing their IT ...