No business wants to suffer a data breach. But unfortunately, in today’s environment, it’s difficult to completely avoid them. Approximately 83% of organizations have experienced more than one data breach. (IBM Security 2022 Cost of a Data Breach Report) These...
Harry Boyne
Features that will make you love the new Windows 11
Microsoft released the Windows 11 operating system (OS) over a year ago. It was largely well-received as stable and user-friendly. The OS is not a large departure from the Windows 10 experience. But it does offer a lot of enhancements over the older environment. Yet...
The Pros and Cons of tracking the digital movement of employees
Since the pandemic, employers around the world have needed to change. They've had to shift how their employees operate. Remote work is very much here to stay. Organisations and employees can both benefit from the work-from-home and hybrid work revolution. Cost savings...
Is that really a text from your CEO, or is it a scam?
Imagine you’re going about your day when suddenly you receive a text from the CEO. The head of the company is asking for your help. They’re out doing customer visits and someone else dropped the ball in providing gift cards. The CEO needs you to buy six £200 gift...
Microsoft OneDrive vs SharePoint, what is the difference?
This is a common question which frequently arises on the call to prospects and during SharePoint “Art of the possible” workshops. What is the difference between Microsoft OneDrive and SharePoint? In short, think of OneDrive as your desk and SharePoint as a filing...
Business Email Compromise
The Challenge: Business Email Compromise is defined by the National Cyber Security Centre as a Phishing attack where the Cyber Criminals attempt to trick a senior executive into transferring funds or revealing sensitive information. The FBI defines the steps of the...
Setup and Management of Active Directory (AD) Conditional Access in the Cloud
The Challenge: In the Cloud, Microsoft defines modern security perimeters extending outside your network. The Solution: User and device identity, where companies have identity-driven signals incorporated as part of their access control. Conditional Access combines...
Technical Assistance with Cyber Essentials, Cyber Essentials Plus and ISO 27001
The Challenge: How do you keep your company’s “cyber hygiene” healthy? The UK Government’s Department for Digital, Culture, Media & Sport's Cyber Security Breaches Survey 2021 confirmed the awareness of Cyber Essentials among businesses stood at 14% with...
SIEM, Email & Microsoft 365 monitoring
The Challenge Evolving threats across your network? How do you detect abnormal behaviour? Start of a potential cyber-attack? How are you notified about security events to prevent cyber breaches? The Solution Technopedia defines Security Information and Event...