Skip to main content
Kieran Headshot
Written byKieran Fowler
Cyber Essentials and ISO 27001, Cyber Resilience, Cyber Security Strategy

The right frame of mind

As the use of online tools increases for communication, data storage and sharing, and automation, so do the opportunities to attack them.

Kieran Headshot
Written byKieran Fowler
Cyber Security Strategy, Cyber Essentials and ISO 27001, Cyber Resilience

Cybersecurity: de-risk your business

39% of all UK businesses experienced a cyber-attack in 2022. Of them, around one in five (21%) identified a more sophisticated attack such as ransomware on their systems.

Clair Hillier
Written byClair Hillier
Future of Work

A day in the life of Clair Hillier

When we talk about flexible working, we really mean it.

Working from home to us actually means working from anywhere; spend a day with Clair, our head of digital delivery management, to…

Craig Headshot
Written byCraig Archdeacon
Cyber Security Strategy, Cyber Resilience

Does hacking make me a criminal?

What do you think when you hear the word ‘Hacker’?

We’re guessing a scary figure behind a computer screen; hoodie up, mask on, hiding behind the anonymity of a virtual world. 

Keira Hall Headshot
Written byKeira Hall
Technology Consulting

The end is nigh

Perhaps we don’t need to be quite so dramatic, but the deprecation of basic authentication in Exchange Online isn’t something to be ignored.

Chris Anderson
Written byChris Anderson
Cyber Resilience, Cyber Security Strategy, Managed IT Service, Managed IT Monitoring and Management, Managed Services, Technology Consulting

Are you ready for the next vSphere?

The countdown is on – in less than six months, general support for vSphere 6.7 (EoGS) will come to an end.

Future of Work, Cloud

How to set up your Microsoft 365 sign-in for multi-factor authentication

Multi-factor Authentication (MFA) is an effective way of preventing hackers from accessing your accounts, even if they manage to crack your password.

Daniel Halliday
Written byDaniel Halliday
Bespoke Software, Data & Analytics

Can a machine really sound like me?

As phishing attacks become more advanced and commonplace, it is more important than ever to be able to defend yourself against them.