Security

FAQs

MOVEit Transfer Vulnerability

On May 31, 2023, Progress Software warned the public about a critical SQL injection vulnerability in MOVEit Transfer, allowing unauthorised access to its database. Identified as CVE-2023-34362 on June...

IT Security worker on tablet

Top 10 benefits of vulnerability scanning

Vulnerability scans are to enterprises what health checkups are to people; they’re proactive check-ins on a system’s health to ensure it stays in tip-top running condition. For companies, a...

Secure remote working

Secure SD-WAN: peace of mind for your network

Like almost every technology innovation ever, for every problem it solves, it trails another along in its wake. Take SD-WAN. It’s a popular choice for those looking for MPLS-level Quality of Service...

Woman working remotely using softphone voice

How to create a digital workspace

Productivity tools enable your teams to work better, but with various solutions available how do you start to create your digital workspace?

Firewalls Explained: Types of Firewalls

Firewalls are an essential part of a company’s cyber security, but there are different types of firewall available and you need to deploy the correct firewall for your company to ensure you are...

Why Redcentric for Security Monitoring & Analytics

DDoS attack: how can one affect your business?

DDoS (Distributed Denial of Service) is an effective and dangerous form of cyber attack that requires specific protections in place to defend your IT. How does a DDoS attack work? DDoS attacks flood...

redcentric

Redcentric

0800 983 2522 sayhello@redcentricplc.com