IT Security

VPNs 101 for SMBs: What They Do, When to Use Them, and Where Zero Trust Fits In

https://youtu.be/fuSdBw2_Oek Quick take A VPN (virtual private network) creates [...]

By |2026-04-09T15:39:12+00:00October 20th, 2025|Blog Posts, News & Events|Comments Off on VPNs 101 for SMBs: What They Do, When to Use Them, and Where Zero Trust Fits In

Half of staff have too much access to data

Do you know who in your business can access your critical data right now?
The risks that come along with that can be bigger than you think. Our latest tech update explains why this matters and what smart businesses are doing about it…

By |2026-04-07T19:08:47+00:00October 20th, 2025|Blog Posts, IT & Cybersecurity Insights|Comments Off on Half of staff have too much access to data

New member of staff… new security risk?

New employees are a prime target for cybercriminals. They don’t know the ropes yet, and the chances of them becoming a victim are high. Here’s what smart businesses are doing about this problem…

By |2026-04-07T19:11:54+00:00October 6th, 2025|Blog Posts, IT & Cybersecurity Insights|Comments Off on New member of staff… new security risk?

Free support for Windows 10 ends in TWO WEEKS

In just over two weeks, Microsoft ends free support for Windows 10 as it reaches end of life. If your business is still using it, this is going to affect you. Here’s what you need to know…

By |2026-04-07T19:14:42+00:00September 29th, 2025|Blog Posts, IT & Cybersecurity Insights|Comments Off on Free support for Windows 10 ends in TWO WEEKS

Microsoft plans a naming system for hackers

Hacking groups are given different names by different security companies. And that means you don’t know who’s really behind an attack so can’t react as quickly as you’d like. That’s about to change, thanks to Microsoft…

By |2026-04-07T19:18:24+00:00September 8th, 2025|IT & Cybersecurity Insights|Comments Off on Microsoft plans a naming system for hackers

What is Shadow IT?

The important thing to remember is your company IT dept. still has to maintain some degree of control over the applications used and where sensitive data is stored. Unfortunately, many users just download apps or start using unsanctioned services, though, and introduce security risks through “shadow IT. or "Shadow Cyber IT”

By |2024-01-26T15:20:22+00:00March 24th, 2019|Blog Posts, IT & Cybersecurity Insights, News & Events|Comments Off on What is Shadow IT?

How to protect your business from cyber crime

An alarming trend of high profile security breaches seems to be happening almost daily. So what should you do? Well if you are the Owner, CEO or Executive of a business, you need to pay attention to this trend. You can’t just sit back and hope that your business won’t be the next victim.

By |2024-03-03T17:39:34+00:00March 24th, 2019|Blog Posts, IT & Cybersecurity Insights, News & Events|Comments Off on How to protect your business from cyber crime
Go to Top