0800 054 6789
What makes the health service so vulnerable to ransomware attacks?
Posted by Caroline Moore on 16/06 at 10:00 AM Data centre, Healthcare, Security,
Ransomware attacks health service image

With the dust settling on the recent WannaCry ransomware attack on the recent NHS, we consider what makes the health service such an attractive target.The simple answer is records. The NHS holds millions of records on practically everyone who lives in the UK. This kind...

Microsoft OneNote: A hit with students and teachers
Posted by Ash Khagram on 13/06 at 10:00 AM Images and graphics, Education, Office 365,

The days of writing your notes on a pad at high speed to capture the relevant points of a lecture or information from a workshop is becoming a thing of the past. Today, modern lecture halls have a sea of students hiding behind laptops, tablets and other devices to take all...

Is your business GDPR-ready?
Posted by Colin Woods on 09/06 at 10:00 AM
GDPR law image

With latest figures revealing 71% of UK businesses are unaware of the fines they will incur if they do not meet the EU General Data Protection Regulation (GDPR), I share an industry-wide concern that most businesses will not be ready when the legislation comes into effect...

Is the Internet of Things safe from hackers?
Posted by Ash Khagram on 06/06 at 10:00 AM Security,
IoT security image

As the Internet of Things gathers momentum and devices are being developed for use in your home, at work, the car and on your body, how do you know which one is keeping your data safe?When you purchase household appliances, you may decide to check the safety rating and...

Why your business telephone system should integrate with your applications
Posted by Adam Williams on 02/06 at 10:00 AM Telephone systems, Unified communications, ShoreTel,
ShoreTel Connect business telephone systems image

The technology you use in the office should enhance your ability to do business. That’s what technology does. Yet, the same technology that helped you serve clients better just a short five or 10 years ago can just as easily hinder your staff’s ability to work as fast or...

IT power failure: Could your business survive a BA-style blackout?
Posted by Colin Woods on 30/05 at 10:00 AM Data centre,
BA IT failure image

With British Airways declaring a power cut as the reason for their IT issues over the bank holiday weekend, we question how this could ever happen.To recap, the airline was hit by a worldwide computer system power failure on Saturday, causing cancellations and delays for...


Law firms often do not have the time or the in-house resource to research the communications and IT solutions that would best fit their needs. As an independent supplier, we can design a converged solution to alleviate the stress of dealing with multiple suppliers while...

Does your business telephone system meet your needs?
Posted by Simon Dunstan on 23/05 at 10:00 AM Telephone systems, Unified communications, ShoreTel,
ShoreTel Connect modern day telephone system image

If your telephone system works, you might think that’s all that matters. But thinking that all you need is a dial tone could be preventing your users from communicating effectively – internally and externally. If you’re using a legacy PBX system, it may not be meeting...

I was hacked by my toaster!
Posted by Ash Khagram on 19/05 at 10:00 AM Security,
I was hacked by my toaster blog

The launch of a smart toaster made the rounds across the web recently. This new device connects to your WiFi and allows users to use an app to monitor the temperature and duration of toast, bagel, crumpet and other edible items to ensure they don’t burn or are...

Three simple steps to fight ransomware
Posted by Colin Woods on 17/05 at 10:00 AM Data centre, Disaster recovery, Security,
Three top tips to protect yourself from ransomware image

Just as the WannaCry ransomware attack has started to dip out of the headlines, the National Security Crime Centre has issued a stark warning.It seems the National Security Crime Centre is convinced that more ransomware attacks will follow. Ransomware attacks see...

Information at our fingertips
Posted by Caroline Moore on 16/05 at 10:00 AM Data centre, Disaster recovery,

As we continue to enjoy Exeter Chiefs' first Premiership title, we reflect on how always-available data forms a part of the team’s working week.In this video, Gareth Steenson describes how all their on-field activity is catalogued into video clips and all they do is...

Why law firms need to protect themselves against cyber-crimes
Posted by Caroline Moore on 15/05 at 01:43 PM Law firms, Security,

Law firms pose an attractive prospect to hackers. The funds they handle and the client details they store make them ripe for ransom, trade and blackmail.This infographic summarises the daily risk and challenges law firms face and how they can help protect themselves...

NHS cyber-attack will surely make businesses take notice of security
Posted by Caroline Moore on 15/05 at 10:00 AM Security,
Protect yourself from cyber hackers

With the ramifications of Friday’s cyber-attack on the NHS still being keenly felt today, maybe other businesses and organisations will finally sit up and take notice of the very real threat hackers pose.As everyone must be aware by now, the NHS was part of a global...

So long Exchange 2007, Hello Office 365
Posted by Ash Khagram on 12/05 at 10:00 AM Office 365,

Microsoft's 10-year lifecycle on products has now retired Exchange 2007. As the evolution of cloud solutions increases, more companies are migrating to Exchange Online with seamless migration into Office 365 and its additional security/spam functions.Our infographic...

Why the legal sector is so vulnerable to cyber-attack
Posted by Caroline Moore on 09/05 at 10:00 AM Security,
Why the legal sector is so vulnerable to cyber-attack

Figures reveal that the legal sector is one of the most vulnerable industries when it comes to cyber-attack. In fact, 73% of the UK top 100 law firms were the target of attacks last year making it a very real concern for managing partners, compliance officers and, if in...

Page 6 of 31 pages ‹ First  < 4 5 6 7 8 >  Last ›