Blog

The Internet is Broken

This month we are sharing a blog from our partner Netskope.

You’ve probably heard at one point or another the cliché that the internet is broken. It’s no secret that the underlying infrastructure that businesses around the world use to access cloud applications and data is flawed and wasn’t built with today’s scale in mind.

more →

Blog

How Financing a SaaS Solution Has Come Full Circle

Paying for Software-as-a-Service (SaaS) solutions has significantly evolved in the last few years. While some SaaS offerings are available on a month-to-month basis, most deals now offer a discount for signing up for multi-year contracts. This offers the opportunity to lock in much lower prices – but usually only if you have the cash/funds to pay for it upfront.

more →

Blog

How Covid-19 has changed the cyber-threat landscape

Even before Covid-19 the cybersecurity threat landscape was evolving at a frightening pace.  The combination of people spending more time online and their uncertainty around the elements of the pandemic and its consequences has played right into the hands of cybercriminals.  Now threat actors are taking full advantage of Covid-19 with a vast portfolio of scams, including ransomware and phishing campaigns.

more →

Blog

Remote Working and Keeping Safe

Iain Westwood

Over the years, Remote Access technology has developed to a degree where a lot of businesses can shift from an office-based to a working from home model to allow business continuity in challenging times – as many have done recently in light of the COVID-19 pandemic.

Unfortunately, despite global events, there are still those who will exploit others for financial gain meaning that secure working practices are more important than ever. 

more →

Blog

Cybersecurity for small businesses

Iain Westwood

The impact of data breaches, network hacks or well-crafted phishing campaigns is often reported in the press.  These reports often cover reputational loss and financial cost to the victim that can run into tens or hundreds of thousands of pounds.  But what about the little guy?

Email attacks

Small businesses can often be the focus of specific targeted email-based attacks.  

more →

Blog

Don’t be the next Travelex!

Iain Westwood

As a business starts its journey towards the cloud, security focus will often shift outwards towards the Internet.  By moving data from inside the traditional network perimeter to the cloud, a whole new set of cybersecurity considerations occur and questions such as “How can we prevent our cloud environment from a breach and protect our data from theft?” become more relevant than ever.

more →

Blog

Cybersecurity Predictions for 2020

Sharon Holland

The dizzying speeds of development in today’s technologies create more opportunities for cybercriminals than ever before.  Each year we are seeing more and more challenges in the fight against cybercrime.  With so many potential targets in the IT environment: on-premise networks, cloud, mobile, and IoT devices, there are many areas that could provide a vulnerability for a cybercriminal to take advantage of.

more →