Search Results for: blog – Page 4

We love blogging about Cyber Security, take a look through the posts below and feel free to comment and share!
Categories
Blog posts
Supply chain cyber attacks, data rich organisations beware
Cyber Security

Supply Chain Cyber Attacks

With regulation authorities focusing on operational resilience, it’s never been more important for organisations to demonstrate how quickly they can recover from operational disruption. Even if your business is well protected from Cyber-attacks the same can’t always be said for your suppliers. Discover our top 4 tips for a robust supplier management strategy and how to manage Cyber risk to improve Cyber resilience documented in the Allianz 2020 Business Risk Barometer.

Read More »
Are you underestimating your Shadow IT problem?
Cyber Security

What Is Shadow IT?

What exactly is Shadow IT? Shadow IT is hardware or software that is predominately cloud-based and used by staff without IT’s knowledge, with no testing or approval given by IT or compliance.

Read More »
Computer code on a screen with a skull representing a computer virus / malware attack
Client Consultancy

How the Solorigate Cyber Attack Could Have Been Prevented

The compromise of the Solarwinds Orion monitoring platform is no doubt, one of the most impactful Cyber Attacks ever – not because it caused any disruption or encrypted any data, but because it involved the compromise of software source code from a reputable company and went un-noticed for what is, in cyber terms, a very long time. 

Read More »
Protecting information in mobile devices. Hacking mobile devices by hackers. Data protection in the cloud.
Cyber Security

Mobile Device Management Security

There are increasingly new ways to work “mobile”, especially as remote working is on the rise. So what precautions should you take to protect your data? We explain where you may find your devices vulnerable and how to prevent risks to your security.

Read More »
A close up shot of LAN cables and blue network servers with a man standing in background.
Cyber Security

Local Area Network Trends – The End of LAN ?

This blog posted is aimed at IT Managers, Heads of IT, IT Directors and other senior leaders with responsibility for IT. Whilst there is some technical content, this isn’t a technical post and is designed to prompt thought and discussion with your IT teams and partners about the future direction of IT within your organisation.

Read More »
person on laptop

G-Cloud Services

Optimising IT are recognised specialists for managed IT services on the G-Cloud 12 Crown Commercial Services framework. Our experts can provide tailor

Read More »
cyber security

Cyber Security Services

Rates of cyber crime are increasing. Tightening regulations threaten to turn data breaches into a death blow for your business. Cyber security must be a top priority.

Read More »
microsoft_365

Managed 365 Services

Ready to experience the true benefits of Microsoft 365 workplace productivity tools? Our managed 365 services promise to extract the very best opportunities from Microsoft’s industry-leading cloud platform.

Read More »
cyber security

Cloud Services

The future of business technology is in the cloud. Don’t fall behind! Upgrade your IT systems with cloud services for small businesses. Give your business a competitive edge, turbo-charge productivity, lockdown security, and unlock your potential.

Read More »