cloud cctv dome camera

How does Cloud CCTV Recording work?

In a previous blog, we discussed Cloud CCTV and how it works for businesses. We discussed how Cloud..

Read more

How you can stop cyber criminals impersonating you.

Email is the primary tool used in business, from internal communication to customers, making it an..

Read more
Online banking against tablets and smartphone

The worst passwords of 2019...have we learned nothing?

Those that follow this blog will remember that we wrote about the worst passwords of 2018 at the..

Read more
pawel-czerwinski-RovCBKMfK_k-unsplash

How you can keep your data safe in a world full of threats.

In today’s modern world, data is king. In 2017, data toppled oil as the new most valuable..

Read more
Businessman hand with loudspeaker and icons flying out

Microsoft launches Windows Virtual Desktop

After being initially announced last year, Microsoft have now launched their Windows Virtual..

Read more
Stressed businessman with head in hands at office

What you should do if your business is hacked!

It is something all businesses dread. You have been hit by a cyber-attack. Despite our best..

Read more
Security concept Lock on digital screen, illustration

3 Cyber Security threats to expect in 2019

2018 had its fair share of cyber-attacks with well-known brands being hit such as British Airways,..

Read more
Professional woman showing concern at work using her laptop

5 common cyber-security mistakes you could be making...

You may have never experienced a cyber-attack, but the chances of you experiencing one are..

Read more
Hacker programing in technology environment with cyber icons and symbols

Shining a spotlight on data breaches

Pick up a newspaper these days and you rarely have to look far to find a story of a cyber-attack...

Read more
young engeneer business man with thin modern aluminium laptop in network server room

Is a firewall enough to protect your network security?

We live in a hyper-sensitive era when it comes to cyber-security. News of hacks and vulnerabilities..

Read more