LinkedIn
Instagram
facebook
Twitter

Support: 01242 504614

Sales: 01242 388530

phone
LinkedIn
Instagram
facebook
Twitter
Results for "blog"
Blog

Blog

Our cyber blog covers comprehensive guides, in-depth discussions and detailed reports into the essential IT topics your business needs to know about.

ISO 27001 Cyber Security

ISO 27001 Cyber Security

Find out more about ISO 27001 and how it protects the information assets of organisations with Optimising IT.

GDPR Fines for Small Businesses: Yes, You Should Be Worried

GDPR Fines for Small Businesses: Yes, You Should Be Worried

May 2018 saw the European Union adopt a new set of data protection laws called the General Data Protection Regulation — now ominously known as the GDPR. Since its inception, the UK government body responsible for cracking down on GDPR breaches, the Information Commissioner’s Office (ICO), has been busy.

Supply Chain Cyber Attacks

Supply Chain Cyber Attacks

With regulation authorities focusing on operational resilience, it’s never been more important for organisations to demonstrate how quickly they can recover from operational disruption. Even if your business is well protected from Cyber-attacks the same can’t always be said for your suppliers. Discover our top 4 tips for a robust supplier management strategy and how to manage Cyber risk to improve Cyber resilience documented in the Allianz 2020 Business Risk Barometer.

What Is Shadow IT?

What Is Shadow IT?

What exactly is Shadow IT? Shadow IT is hardware or software that is predominately cloud-based and used by staff without IT’s knowledge, with no testing or approval given by IT or compliance.

How the Solorigate (Sunburst) Cyber Attack Could Have Been Prevented

How the Solorigate (Sunburst) Cyber Attack Could Have Been Prevented

The compromise of the Solarwinds Orion monitoring platform is no doubt, one of the most impactful Cyber Attacks ever – not because it caused any disruption or encrypted any data, but because it involved the compromise of software source code from a reputable company and went un-noticed for what is, in cyber terms, a very long time. 

Mobile Device Management Security

Mobile Device Management Security

There are increasingly new ways to work “mobile”, especially as remote working is on the rise. So what precautions should you take to protect your data? We explain where you may find your devices vulnerable and how to prevent risks to your security.

LOCAL AREA NETWORK TRENDS – THE END OF LAN AS WE KNOW IT?

LOCAL AREA NETWORK TRENDS – THE END OF LAN AS WE KNOW IT?

This blog posted is aimed at IT Managers, Heads of IT, IT Directors and other senior leaders with responsibility for IT. Whilst there is some technical content, this isn’t a technical post and is designed to prompt thought and discussion with your IT teams and partners about the future direction of IT within your organisation.

Business Software Consulting Services

Business Software Consulting Services

Every business uses software in some shape or form. Software makes business life easier, more effective and increases revenue. But are you maximising the benefit of your business software?