Tags


Latest Posts


Latest Comments


Authors

Internet

Top security threats: September 2015

Posted by Stuart Brown | 9 Oct 2015, 16:48 PM

stuart-brown.jpg

Stuart Brown reflects on some of the top security threats in September and gives some tips on how your organisation can stay protected. This month’s top threats take a closer look at SYNful Knock, Lockerpin and WhatsApp, what happened and how threats can be avoided.

read more

Security threat review: May 2015

Posted by Stuart Brown | 22 Jun 2015, 15:47 PM

stuart-brown.jpg

Each month in our blog Redcentric will be posting a quick overview of the top security threats we have discovered over the last month. From our ongoing threat assessments, this information will include the most common malware, vulnerabilities and exploits our experts have discussed in the hope of providing you with the kind of information that will help you protect your business and its data.

read more

Fifty and fabulous – happy birthday Moores Law

Posted by Ian Rhodes | 23 Apr 2015, 13:43 PM

ian-rhodes.jpg

Ian Rhodes, Platform Director at Redcentric, has a look at Moore’s Law on its 5oth anniversary. He discusses how this is generally interpreted and mapping out the processing power over the last 50 years since his observation, including how today's latest technology are having an impact.

read more

How to Implement a Strong Password Policy

Posted by Stuart Brown | 18 Nov 2014, 15:52 PM

stuart-brown.jpg

Stuart Brown looks at why computer security is important for your business and how to staff password policies. Stuart gives a broad outline of the factors that business owners need to consider when securing their business data.

read more

A Guide to Creating the Perfect Password

Posted by Stuart Brown | 13 Nov 2014, 12:41 PM

stuart-brown.jpg

How do you educate your employees to ensure that account details aren’t hacked due to simpler/more commonly used passwords? Stuart Brown looks at Redcentric’s recently launched security e-books which takes you through the basics of computer security.

read more

Its memory isn’t what it used to be

Posted by Ian Rhodes | 26 Sep 2014, 11:50 AM

ian-rhodes.jpg

As news broke last month that the 512K bug might mean data disruption due to the net's growth and old hardware is upgraded to handle todays Internet demands, Ian Rhodes looks at times where this has happened before and how the industry is developing to support internet growth.

read more

Protect yourself against the UK cyber attack

Posted by Stuart Brown | 12 Jun 2014, 17:41 PM

stuart-brown.jpg

Unless you’ve had your head in the ground, you can’t have failed to have heard that the UK could be the target of the biggest cyber attack ever in the forthcoming week or so. British investigators have been working with the FBI to trace the hackers behind the infamous GOZeus and CryptoLocker botnets.

read more

Confusion reigns part 2: EFM and other TLAs | Redcentric Blog

Posted by John Taylor | 23 Aug 2013, 13:25 PM

john-taylor-redcentric.jpg

In part one of my blog, I looked at how the consumer internet service industry has caused a lot of confusion about what you actually receive from your broadband service. Having cleared up some confusion and explained the terminology, I wanted to take the opportunity to look at some services that may actually deliver what they say on the tin – specifically, EFM.

read more

Confusion reigns: when 20MB/s internet speed is only 2MB/s

Posted by John Taylor | 16 Aug 2013, 13:36 PM

john-taylor-redcentric.jpg

The technology industry loves its confusing terminologies and TLAs (three letter acronyms). Things had improved mainly because of the consumerisation of IT but yet there still exist a lot of different terms and definitions. Nowhere is this truer than in internet service provision.

read more

What does the future hold for Apple?

Posted by Ian Rhodes | 2 May 2013, 14:47 PM

ian-rhodes.jpg

The inexorable pace of the IT industry continues, and it seems even Apple is not immune to queries about their future. With a drop in profits for the first quarter of 2013, is this the beginning of the end? Or would it be foolish to dismiss this colossus of technical innovation?

read more

Ofcom annual plan 2013/14

Posted by Sean Paxton | 5 Apr 2013, 15:35 PM

sean-paxton-home.jpg

Sean Paxton reflects on Ofcom’s plans for 2013 and 2014. As well as changes to the WiFi spectrum, and poles and ducts in rural areas, Sean discusses the potential benefits to customers that the promised easier switching process will bring.

read more

The integration of new technology

Posted by Ian Rhodes | 25 Jan 2013, 17:19 PM

ian-rhodes.jpg

New technology is coming thick and fast. 3D printers that can print buildings, 3D bioprinters that can print steak, and bendable mobile phones are just the tip of the iceberg. But when a technology comes along that aims to completely ‘replace’ the existing, is it really as simple as an initial reveal followed by mass circulation?

read more

How the Internet is upgrading the shopping experience

Posted by Ian Rhodes | 17 Jan 2013, 17:29 PM

ian-rhodes.jpg

Online transactions now account for 55.7% of delivered sales and, with the rise of the mobile age, where tablets and smartphones now serve as menus and shopping baskets, more shoppers are choosing to stay at home rather than face the hustle and bustle of the high street.

read more

Happy 150th birthday to the Tube

Posted by Ian Rhodes | 14 Jan 2013, 17:33 PM

ian-rhodes.jpg

Happy birthday to the Tube. The early life and journey of the Tube is strikingly similar to the development of IT and telecomms in the past few decades – and both have revolutionised the way we work and live.

read more

5 ways to meet the Olympian challenge for high-bandwidth, high-resilience network access

Posted by Ian Rhodes | 3 Jun 2012, 15:12 PM

ian-rhodes.jpg

A recent press report highlighted the continuing change in the nature of internet traffic. The article correctly identifies the “flash floods” of internet demand (for events like the World Cup) as being particularly challenging for many organisations – and the ISPs supporting them.

read more

Surfing the Twitter Games’ bandwidth: the business challenge

Posted by Ian Rhodes | 3 Apr 2012, 16:34 PM

ian-rhodes.jpg

Unsurprisingly, the Internet Services Providers’ Association has recently warned of a “massive hit on the infrastructure” that deliveres internet access, during the London Olympics. Will your Internet Service Provider (ISP) have enough bandwidth to support your business during games? Also, due to security lock-down of manhole covers and other network access points, what plans has your ISP put in place to ensure your network resilience?

read more

Components of a Unified Communications system

Posted by Phil Dyson | 12 May 2011, 17:31 PM

phil-dyson.jpg

In an ideal Unified Communications system, there are 4 key building blocks which are shared across all the different communication tools.

read more

3 Questions a CEO should be asking about Unified Communications

Posted by Phil Dyson | 12 May 2011, 09:13 AM

phil-dyson.jpg

There is much hype in the press about Unified Communications, or simply UC, and the vast array of vendor opinions only adds to the confusion.

read more

How is Unified Communications different to what we have today?

Posted by Phil Dyson | 8 Feb 2011, 14:08 PM

phil-dyson.jpg

One way of understanding why Unified Communications is gaining so much attention is to look at the problem with existing IT systems.

read more
  • First
  • «
  • 1
  • »
  • Last