Blog

Remote Working and Keeping Safe

Iain Westwood

Over the years, Remote Access technology has developed to a degree where a lot of businesses can shift from an office-based to a working from home model to allow business continuity in challenging times – as many have done recently in light of the COVID-19 pandemic.

Unfortunately, despite global events, there are still those who will exploit others for financial gain meaning that secure working practices are more important than ever. 

more →

Blog

Cybersecurity for small businesses

Iain Westwood

The impact of data breaches, network hacks or well-crafted phishing campaigns is often reported in the press.  These reports often cover reputational loss and financial cost to the victim that can run into tens or hundreds of thousands of pounds.  But what about the little guy?

Email attacks

Small businesses can often be the focus of specific targeted email-based attacks.  

more →

Blog

Don’t be the next Travelex!

Iain Westwood

As a business starts its journey towards the cloud, security focus will often shift outwards towards the Internet.  By moving data from inside the traditional network perimeter to the cloud, a whole new set of cybersecurity considerations occur and questions such as “How can we prevent our cloud environment from a breach and protect our data from theft?” become more relevant than ever.

more →

Blog

Cybersecurity Predictions for 2020

Sharon Holland

The dizzying speeds of development in today’s technologies create more opportunities for cybercriminals than ever before.  Each year we are seeing more and more challenges in the fight against cybercrime.  With so many potential targets in the IT environment: on-premise networks, cloud, mobile, and IoT devices, there are many areas that could provide a vulnerability for a cybercriminal to take advantage of.

more →

Blog

Tackle the Data Deluge Problem for Better Cybersecurity

This month we are sharing a blog from our partner eSentire that takes a look at how artificial intelligence and machine learning can help you deal with data security.

Tap AI and ML to scan security and threat logs as part of a two-pronged approach to security and threat detection

We’re now in a machine-scale world, where the scale, complexity and dynamism of data exceeds human capacity to keep up with it.

more →