Blog

We have opinions and we like to share them.

They aren’t always technology related, we like to think we have a thing or two to say about Leadership and management and hope you will find the occasional post or tweet useful.

Are your Microsoft Systems end of life in 2019 and out of road ?

  In late 2019 Microsoft Systems will become end of life. Microsoft will be ending support for both its Windows 7 operating system and Office 2010. This means that any devices running these editions will soon lose support. Here are five reasons why you should already be preparing to avoid this by planning for this […]

Read More

Insider Threat – Is Your Colleague your weakest link ?

A recent report defines insider threat as the biggest threat to data and company security today. It brings to mind the old adage that Generals always fight today’s battles with the mindset of the last. It could be just as true of data security and the protection of your company’s network. What can you do about it ?

Read More

Agile Working – It’s Time For The Talking To Stop

Just two or three years ago, people liked to talk about agile working – but often it was purely talk.

Now, though, it’s genuinely happening and most people who are planning a change in their workplace – whether it’s a new building, a refurbishment or a look at better utilisation of space – are focusing on agile working. So what are some of the themes that underlie true agile working

Read More

Mind the Gap – introducing technology that works for everyone

The challenge all companies are facing is how to introduce new technology that appeals to millennial’s whilst not alienating older generations who can be wary of change. But is the gap as big as we suspect ? Probably not and surely it is in everyone’s interest to minimise that gap?
Here are some areas to consider when introducing new technology.

Read More

The Teddy Bears are Listening…

When Germany banned a connected doll over security concerns, it wasn’t being overly cautious. As it turns out, there’s a textbook example of what happens when toy data privacy goes horribly wrong. Security researchers have discovered that Spiral Toys’ internet-savvy teddy bears, CloudPets, stored kids’ voice messages to their parents. This also included names and […]

Read More

7 musts to implement BYOD successfully

Mobility is essential for a successful company, but the challenge is securing all that data. A mobile workforce Today, employee mobility and office BYOD programs are critical for enterprise productivity. Mobile devices add new security challenges, bypassing many of the security controls you have in place. Mobile devices, mobile apps and the networks they use […]

Read More

Ransomware Protection – What you need to know now

‘Malware Mania’ is back with a vengeance creating havoc for organizations of all sizes and in all industries. Ransomware protection is now the top priority for any organisation. Cyber criminals have morphed their attack methods with the resurgence of. malware and encrypting ransomware to evade traditional antivirus and firewall defence. As a result, your IT […]

Read More