020 3151 6000

GDPR ready in only 14 days

Posted by

G. D. P. R. four dreaded letters that are gaining lots of air time. Data protection and data privacy have always been delicate topics and there is still some misconception behind them, largely due to technical terms and jargon related to computer systems. However, unlike the Data Protection Act which provided a set of principles […]

What were the top security threats of 2017 and can we expect more of the same going forward?

Posted by

Looking back at 2017, it certainly was eventful in the “cyber” world. From the rise of ransomware looting millions of dollars in crypto currencies to targeted cyber-attacks and high profile data breaches, individuals and business alike have been affected on a worldwide scale. Ransomware One of the major types of attack observed in 2017 was […]

Will GDPR stop personal data getting into the wrong hands?

Posted by

Privacy, rights, fines, compliance, data subjects… these are just a few of the buzz words associated with the GDPR that will apply from 25th May this year.  If you’re unsure what this means for you and your business, and don’t know where to start, you’re certainly not alone, but with only three months to go, […]

It’s time to increase your password length

Posted by

Why are passwords targeted? User credentials have always been very important in the world of information technology. A user login and a password give direct access to sensitive and confidential data. This is the very reason why password protection is used: to protect assets and prevent unauthorised access. Therefore, when it comes to cyber-attacks and […]

Do you have a Data Loss Prevention strategy to safeguard your business assets?

Posted by

What is Data Loss Prevention? Data loss prevention (DLP) is a set of policies and controls put in place in order to avoid the loss of critical corporate information. The aim of DLP is to prevent the loss, the unauthorised access and the general misuse of critical and confidential data. Data loss is a significant […]

On-premise vs cloud-managed wifi networks

Posted by

Maslow’s hierarchy of needs states that all people have a set of five established needs ranked in order of desire fulfilment. Many have subsequently proposed that a sixth need comes before all others: Wi-Fi. Whilst it is somewhat of a stretch to suggest that Wi-Fi is a basic human need, it is undoubtedly fast becoming […]

Open Source – the beginners guide

Posted by

What is open source? Simply put, open source is a term used to describe a piece of computer code or application written by others that you can use as is or to further a product of your own. Most people associate the term open source with a single word; free. Whereas this is the case […]