0800 054 6789
Three simple steps to fight ransomware
Posted by Colin Woods on 17/05 at 10:00 AM Data centre, Disaster recovery, Security,
Three top tips to protect yourself from ransomware image

Just as the WannaCry ransomware attack has started to dip out of the headlines, the National Security Crime Centre has issued a stark warning.It seems the National Security Crime Centre is convinced that more ransomware attacks will follow. Ransomware attacks see...

Information at our fingertips
Posted by Caroline Moore on 16/05 at 10:00 AM Data centre, Disaster recovery,

As we continue to enjoy Exeter Chiefs' first Premiership title, we reflect on how always-available data forms a part of the team’s working week.In this video, Gareth Steenson describes how all their on-field activity is catalogued into video clips and all they do is...

Why law firms need to protect themselves against cyber-crimes
Posted by Caroline Moore on 15/05 at 01:43 PM Law firms, Security,

Law firms pose an attractive prospect to hackers. The funds they handle and the client details they store make them ripe for ransom, trade and blackmail.This infographic summarises the daily risk and challenges law firms face and how they can help protect themselves...

NHS cyber-attack will surely make businesses take notice of security
Posted by Caroline Moore on 15/05 at 10:00 AM Security,
Protect yourself from cyber hackers

With the ramifications of Friday’s cyber-attack on the NHS still being keenly felt today, maybe other businesses and organisations will finally sit up and take notice of the very real threat hackers pose.As everyone must be aware by now, the NHS was part of a global...

So long Exchange 2007, Hello Office 365
Posted by Ash Khagram on 12/05 at 10:00 AM Office 365,

Microsoft's 10-year lifecycle on products has now retired Exchange 2007. As the evolution of cloud solutions increases, more companies are migrating to Exchange Online with seamless migration into Office 365 and its additional security/spam functions.Our infographic...

Why the legal sector is so vulnerable to cyber-attack
Posted by Caroline Moore on 09/05 at 10:00 AM Security,
Why the legal sector is so vulnerable to cyber-attack

Figures reveal that the legal sector is one of the most vulnerable industries when it comes to cyber-attack. In fact, 73% of the UK top 100 law firms were the target of attacks last year making it a very real concern for managing partners, compliance officers and, if in...

Law firms: If only you had more time….
Posted by James Hooker on 05/05 at 10:00 AM Legal, Unified communications, Law firms, Unified communications, Video conferencing,
SWComms video conferencing blog post image

Is video conferencing the answer to lawyers juggling the needs of several clients and multiple meetings?  You have several cases to deal with today and they are all in different locations. Time, as always, is of the essence. You could possibly defer a meeting or delegate...

The threat from baby face hackers
Posted by Ash Khagram on 02/05 at 10:00 AM Security,
Protect your data from hackers of every age

What is the average age of a hacker? The rather shocking answer is 17 years old, but there have been reports of suspects as young as 12 being part of a cyber-crime organisation. A recent survey by the National Crime Agency (NCA) has outlined how easy it is for young people...

Protect your data the right way, not the Wronga way!
Posted by Ash Khagram on 28/04 at 10:00 AM Security,
Protect your data the right way, not the Wronga way!

The recent data breach of the high profile pay day lender Wonga involving the loss of 250,000 customer names, email and financial information made national news that highlighted how sophisticated hackers are becoming. Reports were quick to point out that the potential...

5 facts about cyber crime
Posted by Ash Khagram on 25/04 at 10:00 AM Disaster recovery, Security,

Data breaches are becoming a common occurrence in the news with reports of companies being hacked regularly` circulating through the media. Every business is a potential target and hackers are getting more sophisticated in their attempts to capture data. The damage...

Schools: Your data network is your IT backbone
Posted by Caroline Moore on 21/04 at 10:00 AM Data networks, Education,
LAN traffic in schools image

Local area networks or LANs are often the forgotten workhorses of the IT environment. The truth is though is that they often support anything with plug in schools.  Our infographic is designed to highlight the importance of a school LAN and why it should not be neglected...

Availability of data is critical for Exeter Chiefs
Posted by Caroline Moore on 18/04 at 01:10 PM

The demand for 24/7 availability of data in an always-on society is startling relevant for Exeter Chiefs.  Like any business, they need to be able to access their data whenever they need it. Their data consists of video clips and statistics of their previous games, as...

Do not let your staff be distracted by social media
Posted by Caroline Moore on 13/04 at 10:00 AM
Social media distractions image

Whether you use Facebook, Twitter, Instagram, Snapchat, etc., it is something else that vies for your attention, especially if you receive automatic notifications, updates and messages.  Whereas in the past we may have glanced at our mobile devices if we received a text...

Posted by Ash Khagram on 11/04 at 12:27 PM
Network security image

Recently a story circulated around the web regarding a luxury hotel in Europe that had been held to ransom by cyber criminals. It was reported that they used malware to penetrate the hotel network, encrypt access to the door entry system, and then lock all the...

The data needed to create an England player
Posted by Caroline Moore on 11/04 at 12:01 PM Videos and webinars, Data centre,

As England Rugby head into the weekend with the Six Nations title already under their belts and back-to-back Grand Slams within their grasp, one of our very own South West-produced Jack Nowell will hoping his name appears on the team sheet.The Exeter Chiefs winger has...

Page 1 of 27 pages  1 2 3 >  Last ›