Tags


Latest Posts


Latest Comments


Authors

Blog

Why it's time for insurers to invest in tech

Posted by Simon Michie | 23 Sep 2016, 09:11 AM

homepage-update.jpg

Over the next two years more than three quarters of insurance firms are planning on investing in new technology with half planning on investment in 2017. Simon Michie looks at the some of the drivers behind this investment, including security and agility, as insurance firms across the sector look to maximise their customer value and create a competitive edge.

read more

Busting cloud myths

Posted by Stuart Brown | 14 Apr 2016, 14:10 PM

stuart-brown.jpg

With data loss and theft being a big concern of CIO’s, Stuart Brown our Principle Solutions Architect looks at the common myths that surround questions of moving data into the Cloud as well as looking at other areas that could create a data loss or theft within organisations.

read more

Top security threats: September 2015

Posted by Stuart Brown | 9 Oct 2015, 16:48 PM

stuart-brown.jpg

Stuart Brown reflects on some of the top security threats in September and gives some tips on how your organisation can stay protected. This month’s top threats take a closer look at SYNful Knock, Lockerpin and WhatsApp, what happened and how threats can be avoided.

read more

O ye of little faith in cloud security

Posted by Jonathan Birch | 10 Sep 2015, 10:38 AM

jonathon-birch-thumbnail.jpg

After Gartner’s recent ‘Top 10 Cloud Myths’ post Jonathan Birch looks at his experience with the attitudes of customers moving to the Cloud and enterprises’ thoughts on Cloud security. This blog discusses the considerations that an organisation should make when a business decides to move to Cloud services.

read more

Why DDOS demands protection money

Posted by Sean Paxton | 29 Jul 2015, 14:09 PM

sean-paxton-home.jpg

The growth of the digital generation has seen with it an increase in the number of "extortion" rackets where businesses receive polite notices pointing out loopholes in their online security. In this blog, Sean Paxton explains how, much like an offline business accepts security as another essential cost, companies running in the digital world now need to adopt the same mindset.

read more

Shadow IT in the Public Sector: Chasing your shadow

Posted by Mark Hall | 29 Jul 2015, 09:52 AM

mark-hall.jpg

Along with the growth in popularity of technologies like the cloud and BYOD within the workplace, there has come a need for the understanding of these technologies to reach further than just your IT department. In this blog, Mark Hall looks at the growth of self-provisioning IT or 'Shadow IT' and how IT departments within the public sector need to be able to manage it.

read more

Security threat review: May 2015

Posted by Stuart Brown | 22 Jun 2015, 15:47 PM

stuart-brown.jpg

Each month in our blog Redcentric will be posting a quick overview of the top security threats we have discovered over the last month. From our ongoing threat assessments, this information will include the most common malware, vulnerabilities and exploits our experts have discussed in the hope of providing you with the kind of information that will help you protect your business and its data.

read more

Firewalls: to manage or not to manage – that is the question

Posted by Sean Paxton | 25 Mar 2015, 14:05 PM

sean-paxton-home.jpg

While most organisations accept they require the protection provided by next-generation firewalls, some may be confused over whether they should purchase, install and manage their firewall or turn to an expert to manage the next generation firewall on their behalf. Redcentric's Sean Paxton details the options to help you make the decision on whether to go with a managed firewall or the unmanaged option.

read more

4 steps to developing a mobile strategy for enterprises: what you need to know

Posted by Richard Allgate, Mobile Specialist | 25 Feb 2015, 13:11 PM

richard-allgate.jpg

Developing a mobile strategy for your business can be a daunting task for any CTO or IT Manager to undertake so, in this blog, Richard Allgate looks at four of the key steps, from mobile security to network integration, that are an essential part when building your mobile strategy.

read more

'If you can't beat them, join them': What does Blackberry's partnership with Samsung mean for businesses?

Posted by Richard Allgate | 29 Dec 2014, 09:35 AM

richard-allgate.jpg

Following the recent announcement of a strategic partnership tie up between BlackBerry and Samsung, Redcentric's mobile specialist Richard Allgate looks at what this means for both businesses as well as how the deal will help address some of the mobile challenges currently being faced by businesses.

read more

For now and into the future: what our customers learnt at the Redcentric Symposium

Posted by Simon Michie | 18 Dec 2014, 13:53 PM

homepage-update.jpg

Following the huge success of the recent Redcentric Symposium event held in London, Simon Michie reflects on some of the key sessions held by our technology partners throughout the day. With topics ranging from the Internet of Things to Data Security, Simon looks at what the future holds for Redcentric's customers.

read more

How to Implement a Strong Password Policy

Posted by Stuart Brown | 18 Nov 2014, 15:52 PM

stuart-brown.jpg

Stuart Brown looks at why computer security is important for your business and how to staff password policies. Stuart gives a broad outline of the factors that business owners need to consider when securing their business data.

read more

Business Impact Levels

Posted by Mark Hall | 4 Nov 2014, 11:02 AM

mark-hall.jpg

Mark Hall discusses BIL (Business Impact Levels) security controls, looking at what the levels mean, the type of data classified at each level, and the difficulties faced with the BIL data classification model. As the government moves away from the current BIL system to a new three tiered model for data labeling, Mark discusses how this simplifies data classification and allows SME providers the opportunity to compete for these government contracts.

read more

Managing Malware - part 2

Posted by Stuart Brown | 15 Oct 2014, 16:40 PM

stuart-brown.jpg

As the Advance Persistent Threat (APT) landscape continues to evolve, even small companies are now at risk. In the second of his two blogs, Redcentric’s Director of Consulting Stuart Brown looks at the steps SMEs can take to improve their security.

read more

Managing malware – part 1

Posted by Stuart Brown | 8 Oct 2014, 15:52 PM

stuart-brown.jpg

As the Advance Persistent Threat (APT) landscape continues to evolve, even small companies are now at risk. In a series of two blogs, Redcentric’s Principal Solutions Architect Stuart Brown examines why traditional approaches to network security aren’t working and offers advice on what can be done to reduce the threat to your business.

read more

Twitter hacks and the case for two-factor authentication

Posted by Ian Rhodes | 14 May 2014, 14:43 PM

ian-rhodes.jpg

Following on from his last blog on voicemail password protection, Ian Rhodes – Divisional Director of Platform Management – discusses reports that Twitter is to introduce a two factor authentication process in order to improve security. In the wake of a number of high profile account hacks, could two factor authentication be the security solution the social networking site desperately needs?

read more

The future of passwords

Posted by Ian Rhodes | 1 Jul 2013, 14:11 PM

ian-rhodes.jpg

Ian Rhodes concludes his trilogy of password blogs with a look to the future; with developments such as password tattoos being showcased, what will be the next big thing in authentication? Ian also discusses the role of the smartphone, and its potential to act as a third authentication method when properly secured.

read more

Improving voicemail password protection

Posted by Ian Rhodes | 25 Apr 2013, 15:01 PM

ian-rhodes.jpg

Ian Rhodes, Divisional Director of Redcentric, discusses Ofcom’s recent report into the password habits of UK users. The results do not bode well for the security of corporate voicemails, with hackers using advanced software to tap into these voicemails in attempt to hijack the line and make international calls. Ian sheds light on a number of steps businesses should take towards improving their password policies.

read more

Five questions to ask your Cloud provider

Posted by Stefan Haase | 20 Feb 2013, 16:34 PM

stefan-haase.jpg

A recent survey found that an overwhelming majority of IT decision makers are frustrated by the chore of finding a Cloud service provider. If recent events have taught us nothing else, it is that an open line of communication between Cloud provider and end-user is more important than ever. Before virtualising, it is important to find out as much information as you can about the provider. With that in mind, we have come up with 5 key questions to ask your provider before you commit to their services.

read more

Beware fake clouds

Posted by Stefan Haase | 6 Feb 2013, 16:49 PM

stefan-haase.jpg

On the back of my recent blog from the Cloud Expo, I discuss the rising number of ‘fake Cloud’ offerings being proposed to CIOs, along with how to identify and avoid this potential hazard. Without paying due attention to the merits of your Cloud, your business could be at risk. It’s not only finding a resilient, secure Cloud that is a concern to CIOs. I recently read a survey that reported that an overwhelming majority are frustrated by the chore of finding a solution which utilises a genuine Cloud, and is not simply a traditional hosting service given a more pleasing title.

read more