Blog

We love to listen to your opinions – and to share our own!

We like to think that with all our experience of working with businesses large and small, we know a thing or two about leadership and management. Here are a few of our observations. Let us know what you think!

Agile Working – It’s Time For The Talking To Stop

Just two or three years ago, people liked to talk about agile working – but often it was purely talk.

Now, though, it’s genuinely happening and most people who are planning a change in their workplace – whether it’s a new building, a refurbishment or a look at better utilisation of space – are focusing on agile working. So what are some of the themes that underlie true agile working

Read More

Mind the Gap – introducing technology that works for everyone

The challenge all companies are facing is how to introduce new technology that appeals to millennial’s whilst not alienating older generations who can be wary of change. But is the gap as big as we suspect ? Probably not and surely it is in everyone’s interest to minimise that gap?
Here are some areas to consider when introducing new technology.

Read More

The Teddy Bears are Listening…

When Germany banned a connected doll over security concerns, it wasn’t being overly cautious. As it turns out, there’s a textbook example of what happens when toy data privacy goes horribly wrong. Security researchers have discovered that Spiral Toys’ internet-savvy teddy bears, CloudPets, stored kids’ voice messages to their parents. This also included names and […]

Read More

7 musts to implement BYOD successfully

Mobility is essential for a successful company, but the challenge is securing all that data. A mobile workforce Today, employee mobility and office BYOD programs are critical for enterprise productivity. Mobile devices add new security challenges, bypassing many of the security controls you have in place. Mobile devices, mobile apps and the networks they use […]

Read More

Ransomware Protection – What you need to know now

‘Malware Mania’ is back with a vengeance creating havoc for organizations of all sizes and in all industries. Ransomware protection is now the top priority for any organisation. Cyber criminals have morphed their attack methods with the resurgence of. malware and encrypting ransomware to evade traditional antivirus and firewall defence. As a result, your IT […]

Read More

BYOD – Bring your own device – Risks and Rewards

Mobile devices come in all shapes and sizes, from smartphones, notebooks and tablets, to the new-breed hybrid convertibles and detatchables that made headlines at the Consumer Electronics Show 2015. While mobility boosts enterprise employee efficiency by delivering “anywhere access” to business data and systems, it obliterates what’s left of the increasingly ineffective corporate network perimeter. […]

Read More