Balancing information governance standards with the need for mobile clinical access
The NHS 10 Year Health Plan is clear on direction. Care must move out of hospitals, become more integrated across services, and increasingly be delivered in community and neighbourhood settings....
What the Louvre heist tells us about security risks
Author: Ron Miller On the 19th of October 2025 thieves managed to pull of an audacious theft of pieces of the French Crown Jewels from the Louvre Museum in Paris. Not only was this carried out...
Protect your business from impersonation attacks this Black Friday
Black Friday isn’t just a shopping frenzy, it’s a prime opportunity for cybercriminals to strike. While the focus is often on attracting customers and driving sales, this surge in online activity...
Cyber security belongs in the boardroom, not the back office
In today’s threat landscape, resilience isn’t optional. Find out how forward-thinking organisations are strengthening defences before disruption strikes.
Why a virtual CISO makes sense for your business
This blog explores how a vCISO offers a smarter, more cost-effective way to manage cyber security, helping businesses stay secure in an increasingly complex threat landscape.
Cyber risk – why building risk assessments are important
Discover how combining cyber and physical penetration testing can uncover hidden vulnerabilities and boost your building’s security posture.
Penetration Testing: 7 things to test to identify your cyber security risks
This blog discusses seven critical areas to consider within a tailored penetration testing programme.
Resilience in the face of uncertainty
This blog explores how organisations can navigate uncertainty by strengthening their cyber resilience and preparing for disruption.
From Pentesting to strategy: an important first step
Learn how Pentesting fits into a broader security strategy, why choosing the right partner matters, and how accreditation helps you prove your commitment to protecting your organisation.
Proving you’re secure: the role of Pentesting
Discover how Pentesting helps prove your organisation is secure, why it’s essential for managing real-world risks, and how a tailored approach strengthens your overall InfoSec strategy.
Ransomware and UK National Security
In this blog we unpack the latest Parliamentary insights on ransomware, revealing what UK organisations must do now to stay secure.
Improving your security posture and reducing cyber risk
This blog covers key findings from the Government’s latest cyber security survey, revealing evolving threats, rising incidents, and the need for stronger security policies.
vCISO’s corner: budgeting for security initiatives in 2025
Gain insights into how to build a risk-based security budget, understand the challenges and opportunities it addresses, and how to avoid common pitfalls.
Reduce organisational risk by securing your wireless network infrastructure
Discover how advanced wireless security technologies can safeguard your network from modern cyber threats.
NIS2: Are you ready?
With the NIS2 Directive now in effect, stricter regulations and expanded scope mean organisations must act quickly—are you ready for NIS2?
Why choosing a Cyber Essentials certified partner protects your business
Partnering with a Cyber Essentials certified provider ensures robust cyber protection, builds client trust, and supports your business in proactively managing and minimising cyber risks.
Cyber Security Culture and Awareness: not just for October
October is internationally recognised as Cyber Security Awareness month. Yes – we know it’s not October yet, but for our cyber security team it’s Cyber Security Awareness all year round, and...
Small but secure: essential cyber security strategies for small and medium businesses
Our experts share essential cyber security strategies for small and medium sized businesses, so you can grow and innovate in confidence.
The role of the Boards involvement in cyber-security
Successful cyber-attacks continue to make headlines. Three different perspectives on recent events combine to shine a spotlight on one key area for focus and action: the role of the Executive and...
Understanding the growing threat to your cybersecurity from the supply chain
In today’s interconnected world, the supply chain has become an increasingly vulnerable area, posing evolving risks and growing threats to business operations and the delivery of services. By...
Safeguarding your business: A strategic approach to ransomware defence
In today’s interconnected digital landscape, the threat of ransomware looms large, and the consequences of an attack can be devastating for any business. The common misconceptions of...
Why Microsoft Copilot (Bing Chat Enterprise) is a real enabler for businesses looking to use AI
Microsoft Copilot's integration into Microsoft licensing packages and security best practices, positions Copilot AI companion for businesses.
Our cybersecurity predictions for 2024
Our experts explore the intricate cybersecurity landscape of 2024, marked by escalating threats, ensuring leadership support and cybersecurity awareness.
Navigating the cybersecurity landscape in the healthcare sector
A look at the top cyber threats and practical solutions to fortify patient data and hospital systems whilst we help you to navigate the cybersecurity landscape.
Vital Data Assets – What are they and why are they a major gap in Cyber-Resilience planning?
This blog explores why organisations often overlook protecting vital data assets (VDAs) that are crucial but not immediately time-critical.
Do cyber-attacks mean that RTOs and RPOs are pointless?
Explore vital cyber security insights: Understanding RTOs, RPOs, and effective data recovery strategies against costly cyber-attacks.
Safeguarding personal and business data: A call to action
With the alarming surge in cyber threats, as Apple reports a 300% increase in personal data breaches. Our cyber security team delves into the need for heightened awareness.
Our thoughts on the NCSC Annual Review
We’ve highlighted some of the headline stats and takeaways from the recently released NCSC Annual Review 2023 report.
Tom’s Ten Tips for protecting your organisation against Ransomware
Here are some top tips from Tom Holloway, Head of Redcentric’s cyber security division, to help you safeguard your assets and data.
How to keep your passwords protected
Read more about our recent study on unique passwords, how Brits protect their passwords and how they create their passwords.
Navigating the constantly evolving cyber security landscape with cutting-edge technology and expertise
In an era defined by seemingly unending technological advances, with businesses relying more than ever on digital infrastructure and data, the importance of robust cyber security practices cannot be...
What is Vulnerability Management?
In this article we look at the what, why and how to vulnerability management to help you stay informed and secure.
MOVEit Transfer Vulnerability
On May 31, 2023, Progress Software warned the public about a critical SQL injection vulnerability in MOVEit Transfer, allowing unauthorised access to its database. Identified as CVE-2023-34362 on June...
Top tips to effectively mitigate cyber-attacks including ransomware
Ransomware has been hitting the UK headlines recently with the severe disruption to Royal Mail’s overseas deliveries, employee data of The Guardian being accessed and Rackspace’s Hosted...
How does a firewall work? What to know before your next attack
If you’re responsible for an IT setup then a firewall (or even more than one) is essential to keeping your data protected against cyber attacks. But what actually is a firewall and how does it...
Top 10 benefits of vulnerability scanning
Vulnerability scans are to enterprises what health checkups are to people; they’re proactive check-ins on a system’s health to ensure it stays in tip-top running condition. For companies, a...
Secure SD-WAN: peace of mind for your network
Like almost every technology innovation ever, for every problem it solves, it trails another along in its wake. Take SD-WAN. It’s a popular choice for those looking for MPLS-level Quality of Service...
Why does your organisation need vulnerability management?
Every year, cybercriminals find and take advantage of a corporate system’s vulnerabilities. They feast on open communication protocols and exposed databases that show no sign of regular security...
How a data centre can improve your cyber security
A third of UK businesses lose customers after a cyber attack. cDiscover how a data centre an support your cyber security.
How to create a digital workspace
Productivity tools enable your teams to work better, but with various solutions available how do you start to create your digital workspace?
Which virtual desktop solution is best-suited for your business?
Choosing the right virtual desktop can be hard. We look at four of the most popular platforms, their pros and cons and our recommendations.
What is credential stuffing and how does it affect your business?
Credential stuffing can leave your business vulnerable. We look at the dangers of credential stuffing and what your business can do to stay protected.
What is SIEM and how can it help protect your business?
A proactive mindset and a SIEM strategy in place, businesses can massively reduce the risk of a cyber-attack. But what exactly is SIEM? Find out more in this article
Why you shouldn’t have your system backup stored locally
Every company needs to backup their system since it’s the only line of defence against several threats that can corrupt or invalidate your data, but you need to make sure your backup is capable of...
High-performance computing: Managing cyber security risk
HPC isn’t new, – just as data isn’t new. Scientists have been using both for a long time. But the amount of data we collect has grown exponentially in the last few decades and it’s no longer...
Firewalls Explained: Types of Firewalls
Firewalls are an essential part of a company’s cyber security, but there are different types of firewall available and you need to deploy the correct firewall for your company to ensure you are...
DDoS attack: how can one affect your business?
DDoS (Distributed Denial of Service) is an effective and dangerous form of cyber attack that requires specific protections in place to defend your IT. How does a DDoS attack work? DDoS attacks flood...