Blog

Teamwork and Collaboration: It’s Time for Business Leaders to Embrace Change (Part 2)

Richard Brown

In part 1 of this blog series, I introduced the concept of unleashing the potential of teams. Working collectively on a task can boost performance significantly. And as teams become more distributed in the modern workforce, collaboration is the number one factor that companies need to implement.

In this article, I explore some of the collaboration products and technologies available and discuss what businesses are doing to drive change.

more →

Blog

Leverage Your Investment in Cisco Telephony and Cisco UC – 7 Must-Have Enhancements

Richard Brown

However you look at it, the telephony system has come further in the last 10 years than it did in the previous century. The introduction of IP telephony to the mainstream around the millennium provided the foundation for innovation to completely reinvent communications within the business.

And yet with the change from IP Telephony and Convergence to Unified Communications and Collaboration (as it is now badged) the majority of businesses are still only just realising what is possible.

more →

Blog

GDPR: Top 10 Technologies To Aid Compliance (Part 5 of 5)

Max Pritchard

In Part 1 of this GDPR blog series, we looked at the PII threat landscape and the legal & financial consequences of technology failure. In Part 2, we highlighted the major provisions in the GDPR for technological measures to protect data. In Part 3, we examined some of the guiding principles to be considered in relation to the technological impact of the GDPR within an organization.

more →

Blog

Spectre And Meltdown, The Good News

Max Pritchard

Vulnerabilities in modern computers leak passwords and sensitive data

Spectre and Meltdown are the names of theoretical attack techniques which exploit weaknesses in many modern microprocessor chips. The attacks seem to be extremely limited in scope – able only to allow an unauthorised programme to read data from parts of the computer memory that it ought not to have access to.

more →

Blog

Is Your Online Business Vulnerable to Bad Bots?

An ever-increasing amount of internet traffic is generated by non-human users. Increasingly, websites are facing large volumes of traffic caused by automated scripts, or bots. According to Incapsula’s 2016 report, 51.8% of web traffic was caused by bots – total bot traffic now exceeds total human traffic. All this traffic can be a significant drain on available bandwidth for websites, and cause issues for real customers trying to access your site.

more →

Blog

GDPR – Is Data Encryption Really Necessary?

Max Pritchard

It’s no secret that the proposed EU General Data Protection Regulation is technology-agnostic. It demands that companies implement proportionate, cost-effective controls to protect the personal data of EU residents, as well as enabling data subjects to exercise their rights over their own personal data. The only technology areas specifically mentioned in the regulation, currently, are pseudonymization and data encryption.

more →