Skip to page content
Client Hub Tel 01892 830111

Author: Russell Gower-Leech, Technical Solutions Architect

Filters:

Security in the hybrid workplace: what does good look like?

As the CORONApocalypse continues to fade and we all get back to whatever normal is, it's a good opportunity to look back at the changes we have made in the workplace over the last 12-16 months to keep our businesses going and ask ourselves, "is this good?".

Read More

Cyber Security: Playing the Blame Game

I was talking with a colleague the other day about security breaches and in particular business email compromises. Just to set the scene, a business email compromise is where a criminal (or threat actor as they're called in the infosec world) gets in the middle of a chain of email communications to divert funds. There are several ways this can happen and I'll cover those as we go, but in this instance a user had received an email notifying them of a change of bank details so they could pay an outstanding invoice. The email came from a known contact and followed an existing thread.

Read More

Wi-Fi: Are you getting the best coverage?

Wi-Fi is an interesting beast in that it has become ubiquitous in its presence and our desire to consume it. Wherever we go we are either looking out for free Wi-Fi or the businesses we visit are actively promoting we use it. In our homes it fuels most of our devices (I dare say there will be some like me who own a comms cabinet full of tech but it's pretty rare) and should it fail it can (according to my children) be like falling back in time.

Read More

Choosing an MFA Solution

By now I'm sure you're all familiar with the terms "MFA (Multi Factor Authentication), 2FA (Two Factor Authentication) or Strong Authentication" over the last few years, for those of you that aren’t these are largely the same thing (there are some technical & semantical differences but for simplicity let's not get into those) in that they support your traditional Username & Password

Read More

PSTN: Whats that?

PSTN or Public Switched Telephony Network is the traditional (landline) system providing telephone connectivity since the 1800's using a mixture of underground and over ground copper wires.

Read More

Security Tips For Working From Home (WFH)

As you're probably all bored of hearing by now, Working From Home/Remotely is the new norm for pretty much anyone that can. For those of us who've been doing this for a number of years we can kind of take this for granted asking ourselves "What's the big deal?". It's actually been a recurring point of conversation amongst my colleagues friends and family and it got me thinking, initially all the talk has been...

Read More

How safe are you online? Check out our top tips to make sure you’re Cybersecurity Savvy

Unfortunately, potential security threats are everywhere, so it’s important for us to be as aware of these as possible

Read More

Cybersecurity Awareness Month: 5 essential top tips you need to know for a secure password

When it comes to remembering things, humans can be pretty rubbish at retaining information. Increasingly in our lives we rely more and more on technology to assist us in the form of smart assistants and wearables to...

Read More

Plan for the Worst, Achieve the Best

Obviously this isn’t an all-encompassing check list for Disaster Recovery (DR) planning, but it should provide a high level starting point. Availability, or uptime, are priorities for all businesses big and small. The keys to which are understanding and planning. -One important...

Read More

Contact Us