Are your apps making your business vulnerable?

Software Are your apps making your business vulnerable? Appsidents will happen. When you allow a device onto your business network, it’s not just the device you allow. Every device has apps or software that run the processes you need to work.  But these...

Do you have redundancy in place for your data?

Software Do you have redundancy in place for your business data? Backup isn’t planning for the worst. It’s planning. Redundancy, backup, disaster recovery, call it what you will. None of us like planning for when something goes wrong because it means we...

Are your business emails secure?

Software Are your business emails secure? The front line of cyber crime. The popular image of cyber criminals in films and TV shows is a geek in a hoodie, hunched over a laptop, tapping furiously in an attempt force their way into a “mainframe” in order to...

Which devices can access your business and its data?

Hardware Which devices can access your business and it’s data? Introduction. Business spaces are rapidly becoming much more flexible. Workers are no longer tied to a desk and their devices tethered to a cable. Both staff and visitors flow in and out of the...

Is your hardware keeping your data safe?

Hardware Is your hardware keeping your data safe? Introduction. If your work laptop is stolen, what do you think is worth more to the thief, the laptop itself, or the data contained within? With such a vibrant marketplace for business data on the Dark Web, it’s...