Tags
- Cloud 91
- Public Sector 37
- Security 34
- Data centres 32
- Managed Services 24
- business continuity 19
- G-Cloud 17
- outage 14
- Data Protection 12
- VoIP 12
- Data Security 12
- BYOD 12
- Remote Working 11
- Unified Communications 11
- disaster recovery 10
- Data Storage 10
- Cloud Services 10
- Government 10
- Mobile 9
- resilience 8
- Hybrid Cloud 8
- Legal 8
- Healthcare 8
- IP Telephony 7
- ADSL 7
- downtime 6
- Wi-FI 6
- Internet 6
- Telephony 6
- NHS 6
- N3 6
- Data Backup 5
- Cloud Computing 5
- IaaS 5
- Public Cloud 5
- internet of things 5
- DBaaS 5
- efficiency 5
- MDM 5
- Service Provider 4
- Oracle 4
- Infrastructure 4
- Data Centres 4
- MPLS 4
- Malware 4
- Cloud Telephony 4
- BlackBerry 4
- 4G 4
- Data Protection Act 3
- SLA 3
- Private Cloud 3
- SaaS 3
- Google 3
- Public Sector Network 3
- Symposium 3
- Network 3
- HSCN 3
- technology 3
- Regulations 3
- Apple 3
- SIP trunking 3
- Online Backup 2
- SQL Server 2
- databases 2
- BT 2
- PAYG 2
- VDI 2
- Amazon 2
- Mainframe 2
- Desk Top Sharing 2
- Migration 2
- IT Management 2
- Database as a Service 2
- Cloud Strategy 2
- data sovereignty 2
- ICT 2
- Insurance 2
- Software 2
- Applications 2
- Data 2
- PSN 2
- Wireless 2
- Retail 2
- Data Centre Provider 2
- Connectivity 2
- GDPR 2
- Ofcom 2
- EFM 2
- QoS 2
- ISDN 2
- CYOD 2
- MVNO 2
- Enterprise 2
- Mobile Strategy 2
- mobile data 2
- Firewall 2
- network 2
- SD-WAN 2
- Outage 1
- Online Storage 1
- Support 1
- Unreliability 1
- Availability 1
- DDoS Attacks 1
- IT Provisioning 1
- business agility 1
- Contingency 1
- Federated Clouds 1
- Cloud to Cloud 1
- Salesforce.com 1
- Gartner 1
- virtualisation 1
- US Patriot Act 1
- cloud 1
- Platforms 1
- Blogging 1
- Data Sharing 1
- OCS 1
- Productivity 1
- Video Conferencing 1
- fog computing 1
- Services 1
- Virtual Desktop 1
- Hosted Desktop 1
- SIAM 1
- CCS 1
- Crown Commercial Services 1
- Cloud Provider 1
- Government as a Platform 1
- shadow IT 1
- Ransomware 1
- Digital Economy Centres 1
- IT 1
- HETT 1
- CGBT 1
- Journey to the Cloud 1
- Journey To The Cloud 1
- IT Services 1
- Microsoft Office 1
- Azure 1
- Digital Strategy 1
- Digital Marketplace 1
- AWS 1
- VMWare 1
- OpenStack 1
- Public Wi-Fi 1
- Legal Sector 1
- data security 1
- hybrid cloud 1
- SMEs 1
- Brexit 1
- Privacy 1
- security 1
- innovation 1
- insurance 1
- DevOps 1
- retail 1
- IT infrastructure 1
- HSCN Connectivity 1
- Cloud Transformation Process 1
- Citrix on Azure 1
- next generation on vdi solution 1
- Prism 1
- PUE 1
- Cold aisle containment 1
- Cooling 1
- Power 1
- hosting 1
- power 1
- JANET 1
- data controllers 1
- General Data Protection Regulation 1
- Microsoft 1
- SAP 1
- Hosting 1
- BIL 1
- Freedom of Information Act 1
- Personal Data 1
- Bandwidth 1
- Social Media 1
- Streaming 1
- Email 1
- Messaging 1
- Contention Rates 1
- SDSL 1
- 512k bug 1
- password 1
- Moore’s Law 1
- wearables 1
- microchip 1
- Intel 1
- security threats 1
- WannaCry ransomware attack 1
- Collaboration 1
- Home Working 1
- playback service 1
- call recording platform 1
- call recording service 1
- MYOD 1
- BES10 1
- Consumer 1
- Blackphone 1
- iPhone 6 1
- iCloud 1
- iOS 8 1
- Samsung 1
- Networks 1
- Network Operators 1
- Coverage 1
- call rates 1
- HSCIC 1
- VPLS 1
- Two-Factor Authentification 1
- FTTP 1
- Cambridge 1
- Metro Network 1
- IPv6 1
- Network design 1
- Network Planning 1
- ISDN30 1
- N3 Aggregator 1
- Network Security 1
- Unified Threat Management 1
- Convergance 1
- Shadow IT 1
- Software Defined Networks 1
- SDN 1
- Virtualisation 1
- Wi-Fi 1
- #GenMobile 1
- LAN 1
- Compliance 1
- ITIL 1
- Customer Service 1
Latest Posts
- Having a different conversation about SD-WAN 23 May 2018, 14:02 PM
- Cloud Workspace ‘a powerful combination’ 3 May 2018, 11:17 AM
- Orchestrating Cloud transformation 17 Apr 2018, 09:38 AM
- Why SD-WAN is good business 9 Apr 2018, 14:02 PM
- A robust security-first culture will tackle any security threat 6 Mar 2018, 17:24 PM
Latest Comments
Authors
- Stefan Haase
- Tim Wilkinson
- Paul Hone
- Ian Rhodes
- Louis Ozougwu – MCITP - OCP - Oracle RAC
- Jonathan Birch
- Sean Paxton
- Glenn Temple
- Mark Hall
- Simon Michie
- James Odom
- Peter Nailer
- Fraser Fisher
- John Roberts
- Phil Dyson
- Graham Francis
- Andy Mills
- Mark Halpin
- Chris Bull
- Vaughan Andrews
- Martin Fisher
- Francis White
- Stuart Brown
- Phil Moore
- Anton Murphy
- Damon Crawford
- Wesley Hornsey
- Louis Ozougwu
- Chris Mcmahon
- John Taylor
- Paul Storey
- Richard Allgate
- Richard Allgate, Mobile Specialist
- Mark Hall, Public Sector Director
- Clive Atkins
- Stephen Rees
- Andrew Nicholl
Blog
Busting cloud myths
Posted by Stuart Brown | 14 Apr 2016, 14:10 PM

With data loss and theft being a big concern of CIO’s, Stuart Brown our Principle Solutions Architect looks at the common myths that surround questions of moving data into the Cloud as well as looking at other areas that could create a data loss or theft within organisations.
read moreTop security threats: September 2015
Posted by Stuart Brown | 9 Oct 2015, 16:48 PM

Stuart Brown reflects on some of the top security threats in September and gives some tips on how your organisation can stay protected. This month’s top threats take a closer look at SYNful Knock, Lockerpin and WhatsApp, what happened and how threats can be avoided.
read moreSecurity threat review: May 2015
Posted by Stuart Brown | 22 Jun 2015, 15:47 PM

Each month in our blog Redcentric will be posting a quick overview of the top security threats we have discovered over the last month. From our ongoing threat assessments, this information will include the most common malware, vulnerabilities and exploits our experts have discussed in the hope of providing you with the kind of information that will help you protect your business and its data.
read moreHow to Implement a Strong Password Policy
Posted by Stuart Brown | 18 Nov 2014, 15:52 PM

Stuart Brown looks at why computer security is important for your business and how to staff password policies. Stuart gives a broad outline of the factors that business owners need to consider when securing their business data.
read moreA Guide to Creating the Perfect Password
Posted by Stuart Brown | 13 Nov 2014, 12:41 PM

How do you educate your employees to ensure that account details aren’t hacked due to simpler/more commonly used passwords? Stuart Brown looks at Redcentric’s recently launched security e-books which takes you through the basics of computer security.
read moreManaging Malware - part 2
Posted by Stuart Brown | 15 Oct 2014, 16:40 PM

As the Advance Persistent Threat (APT) landscape continues to evolve, even small companies are now at risk. In the second of his two blogs, Redcentric’s Director of Consulting Stuart Brown looks at the steps SMEs can take to improve their security.
read moreManaging malware – part 1
Posted by Stuart Brown | 8 Oct 2014, 15:52 PM

As the Advance Persistent Threat (APT) landscape continues to evolve, even small companies are now at risk. In a series of two blogs, Redcentric’s Principal Solutions Architect Stuart Brown examines why traditional approaches to network security aren’t working and offers advice on what can be done to reduce the threat to your business.
read moreProtect yourself against the UK cyber attack
Posted by Stuart Brown | 12 Jun 2014, 17:41 PM

Unless you’ve had your head in the ground, you can’t have failed to have heard that the UK could be the target of the biggest cyber attack ever in the forthcoming week or so. British investigators have been working with the FBI to trace the hackers behind the infamous GOZeus and CryptoLocker botnets.
read more- First
- «
- 1
- »
- Last