Articles

Resilience in the round; building a unified resilience strategy
In today's unpredictable business environment, the ability to maintain operations and adapt to crises is vital. By investing in robust business continuity planning, fostering a culture of…
Cyber Report Spotlight: Microsoft internal files accidentally exposed to the internet
In this month's cyber report we delved into a recent cyber security risk at Microsoft where an improperly configured server left internal Microsoft data, including passwords, exposed online…

Get Breach Ready - Minimise the impact of a successful cyber attack
The main topic of conversation around cybersecurity often focuses on preventing data breaches, but what we forget is the processes needed to minimise their impact. Even with staff training and…

Immutable backup storage - the last line of defence
We all know that using an air gap within a backup solution to put space between you and cyber criminals is vital, but with discussion around the security – or lack thereof - of data more prevalent…

Life’s a breach – saying goodbye to cyberattacks
Life's a Breach was an exciting event we hosted in association with ALARM.

How DORA capabilities are shaping software delivery
As a bespoke software developer, you really only have one goal: deliver high-quality software that meets the needs, and exceeds the expectations, of your clients

Couch to 365 | Gathering Intel
This is part of the Couch to 365 series, developed by Waterstons. If you haven’t already, sign up now for free at Couchto365.com.

Knock Knock: Opening the door to service design
How can you be sure that the person at your door is really from British Gas? Or the IT engineer is really from Waterstons? How can an app help answer those questions? Innovation Consultant Katie…