at the On the 15th & 16th March, Twin Systems attended the Cloud Expo Europe. This was our first expo so there were plenty of learning curves but overall it was a very positive experience. Network Detective was the main product push. This is a handy infrastructure and security audit tool that can be […]
We have opinions and we like to share them.
They aren’t always technology related, we like to think we have a thing or two to say about Leadership and management and hope you will find the occasional post or tweet useful.
When Germany banned a connected doll over security concerns, it wasn’t being overly cautious. As it turns out, there’s a textbook example of what happens when toy data privacy goes horribly wrong. Security researchers have discovered that Spiral Toys’ internet-savvy teddy bears, CloudPets, stored kids’ voice messages to their parents. This also included names and […]
Mobility is essential for a successful company, but the challenge is securing all that data. A mobile workforce Today, employee mobility and office BYOD programs are critical for enterprise productivity. Mobile devices add new security challenges, bypassing many of the security controls you have in place. Mobile devices, mobile apps and the networks they use […]
‘Malware Mania’ is back with a vengeance creating havoc for organizations of all sizes and in all industries. Ransomware protection is now the top priority for any organisation. Cyber criminals have morphed their attack methods with the resurgence of. malware and encrypting ransomware to evade traditional antivirus and firewall defence. As a result, your IT […]
Here at Twin Systems we have been taking a business focused approach to technology for over twenty years. It has taken a while but at last we have put some of this into our Business Technology Guide Taking 9 key areas that our clients are talking to us about we have tried to give you […]
Today’s technologist works with colleagues who often feel they are caught in the digital revolution, stakeholders demand more from technology than ever before. Often, it makes directors, colleagues and even suppliers feel overwhelmed, and (at best) they expect IT to figure it out for them, without them. To act as their “proxy”. The real role […]
Mobile devices come in all shapes and sizes, from smartphones, notebooks and tablets, to the new-breed hybrid convertibles and detatchables that made headlines at the Consumer Electronics Show 2015. While mobility boosts enterprise employee efficiency by delivering “anywhere access” to business data and systems, it obliterates what’s left of the increasingly ineffective corporate network perimeter. […]
If your in-box is currently reporting unread messages in the hundreds or thousands, you might have a hard time believing the news: e-mail is on the decline. The total volume of e-mail has dropped about 10 percent since 2010. So is there a new digital channel wrestling for your attention Email V Messaging ? The […]
Many companies that we engage with mistakenly believe that their routine backup operations have them covered in an outage or disaster. I can’t tell you how many times I’ve heard a CIO say, “Our data is backed up via XYZ software each night. That’s our DR plan.” Data backup and disaster recovery are not the […]
Every single year since I can remember there is very stiff competition for the most over used word or phrase within the outsourcing technology industry. The word cloud when applied like a magic bullet to every area of technology has to be the most over used word in our current lexicon. The Simplest and Easiest […]