The race for our attention - What do we really want to do in our lives?

The best way to get someone's attention is to know how their mind works. If you have teenage children, you may be aware of Snapchat Streak, which...

Infosec2018 – from live-hack fails to password managers and combating the rise of ransomware

Cybersecurity is big business when malware and phishing schemes show no signs of slowing (and the big banks we trust with our hard-earned money can’t...

Are you secure? The pros and cons of your legacy architecture

When it comes to your existing IT systems, if they’re not broken, don’t fix them, right?

Sometimes I think this is absolutely true; there’s a genuine...

Disaster recovery: do you know the true cost?

Have you considered what would happen if your systems failed tomorrow, with no warning? More importantly, if you’re responsible for security and your...

How can businesses prepare for IT disaster?

The type of IT disaster which concerns our customers isn’t courtesy of Mother Nature, their own health, unanticipated accidents or technology failure...

Securing the mobile office

Advances in mobile technology have evolved the way we do business, and work doesn’t have to be somewhere people go anymore, it can simply be...