Blog

We love to listen to your opinions – and to share our own!

Welcome to our IT blog! Here you could find a thing or two about current technological and worldly affairs that could affect business.

Here are a few of our observations. Let us know what you think!

Insider Threat – Is Your Colleague your weakest link ?

A recent report defines insider threat as the biggest threat to data and company security today. It brings to mind the old adage that Generals always fight today’s battles with the mindset of the last. It could be just as true of data security and the protection of your company’s network. What can you do about it ?

Read More

Agile Working – It’s Time For The Talking To Stop

Just two or three years ago, people liked to talk about agile working – but often it was purely talk.

Now, though, it’s genuinely happening and most people who are planning a change in their workplace – whether it’s a new building, a refurbishment or a look at better utilisation of space – are focusing on agile working. So what are some of the themes that underlie true agile working

Read More

Mind the Gap – introducing technology that works for everyone

The challenge all companies are facing is how to introduce new technology that appeals to millennial’s whilst not alienating older generations who can be wary of change. But is the gap as big as we suspect ? Probably not and surely it is in everyone’s interest to minimise that gap?
Here are some areas to consider when introducing new technology.

Read More

The Teddy Bears are Listening…

When Germany banned a connected doll over security concerns, it wasn’t being overly cautious. As it turns out, there’s a textbook example of what happens when toy data privacy goes horribly wrong. Security researchers have discovered that Spiral Toys’ internet-savvy teddy bears, CloudPets, stored kids’ voice messages to their parents. This also included names and […]

Read More

7 musts to implement BYOD successfully

Mobility is essential for a successful company, but the challenge is securing all that data. A mobile workforce Today, employee mobility and office BYOD programs are critical for enterprise productivity. Mobile devices add new security challenges, bypassing many of the security controls you have in place. Mobile devices, mobile apps and the networks they use […]

Read More

Ransomware Protection – What you need to know now

‘Malware Mania’ is back with a vengeance creating havoc for organizations of all sizes and in all industries. Ransomware protection is now the top priority for any organisation. Cyber criminals have morphed their attack methods with the resurgence of. malware and encrypting ransomware to evade traditional antivirus and firewall defence. As a result, your IT […]

Read More