Windows 7 was such a great operating system. But its life is coming to an end. From January, Microsoft will no longer be supporting it. And that will have serious implications for your business… even if just one of your computers still uses Windows 7.
We have opinions and we like to share them.
They aren’t always technology related, we like to think we have a thing or two to say about Leadership and management and hope you will find the occasional post or tweet useful.
A recent report defines insider threat as the biggest threat to data and company security today. It brings to mind the old adage that Generals always fight today’s battles with the mindset of the last. It could be just as true of data security and the protection of your company’s network. What can you do about it ?
Just two or three years ago, people liked to talk about agile working – but often it was purely talk.
Now, though, it’s genuinely happening and most people who are planning a change in their workplace – whether it’s a new building, a refurbishment or a look at better utilisation of space – are focusing on agile working. So what are some of the themes that underlie true agile working
On the 15th & 16th March, Twin Systems attended the Cloud Expo Europe. This was our first expo so there were plenty of learning curves but overall it was a very positive experience.
When Germany banned a connected doll over security concerns, it wasn’t being overly cautious. As it turns out, there’s a textbook example of what happens when toy data privacy goes horribly wrong. Security researchers have discovered that Spiral Toys’ internet-savvy teddy bears, CloudPets, stored kids’ voice messages to their parents. This also included names and […]
Mobility is essential for a successful company, but the challenge is securing all that data. A mobile workforce Today, employee mobility and office BYOD programs are critical for enterprise productivity. Mobile devices add new security challenges, bypassing many of the security controls you have in place. Mobile devices, mobile apps and the networks they use […]
‘Malware Mania’ is back with a vengeance creating havoc for organizations of all sizes and in all industries. Ransomware protection is now the top priority for any organisation. Cyber criminals have morphed their attack methods with the resurgence of. malware and encrypting ransomware to evade traditional antivirus and firewall defence. As a result, your IT […]
Here at Twin Systems we have been taking a business focused approach to technology for over twenty years. It has taken a while but at last we have put some of this into our Business Technology Guide Taking 9 key areas that our clients are talking to us about we have tried to give you […]
Today’s technologist works with colleagues who often feel they are caught in the digital revolution, stakeholders demand more from technology than ever before. Often, it makes directors, colleagues and even suppliers feel overwhelmed, and (at best) they expect IT to figure it out for them, without them. To act as their “proxy”. The real role […]
Mobile devices come in all shapes and sizes, from smartphones, notebooks and tablets, to the new-breed hybrid convertibles and detatchables that made headlines at the Consumer Electronics Show 2015. While mobility boosts enterprise employee efficiency by delivering “anywhere access” to business data and systems, it obliterates what’s left of the increasingly ineffective corporate network perimeter. […]