Why a virtual CISO makes sense for your business
As cyber threats become more advanced, businesses can no longer afford to rely on disjointed security solutions. Recent high-profile breaches like MOVEit (2023) have exposed the vulnerabilities in...
As cyber threats become more advanced, businesses can no longer afford to rely on disjointed security solutions. Recent high-profile breaches like MOVEit (2023) have exposed the vulnerabilities in...
October is internationally recognised as Cyber Security Awareness month. Yes – we know it’s not October yet, but for our cyber security team it’s Cyber Security Awareness all year round, and...
Our experts share essential cyber security strategies for small and medium sized businesses, so you can grow and innovate in confidence.
Successful cyber-attacks continue to make headlines. Three different perspectives on recent events combine to shine a spotlight on one key area for focus and action: the role of the Executive and...
In today’s interconnected world, the supply chain has become an increasingly vulnerable area, posing evolving risks and growing threats to business operations and the delivery of services. By...
In today’s interconnected digital landscape, the threat of ransomware looms large, and the consequences of an attack can be devastating for any business. The common misconceptions of...
Microsoft Copilot's integration into Microsoft licensing packages and security best practices, positions Copilot AI companion for businesses.
Our experts explore the intricate cybersecurity landscape of 2024, marked by escalating threats, ensuring leadership support and cybersecurity awareness.
A look at the top cyber threats and practical solutions to fortify patient data and hospital systems whilst we help you to navigate the cybersecurity landscape.
This blog explores why organisations often overlook protecting vital data assets (VDAs) that are crucial but not immediately time-critical.
Explore vital cyber security insights: Understanding RTOs, RPOs, and effective data recovery strategies against costly cyber-attacks.
With the alarming surge in cyber threats, as Apple reports a 300% increase in personal data breaches. Our cyber security team delves into the need for heightened awareness.
We’ve highlighted some of the headline stats and takeaways from the recently released NCSC Annual Review 2023 report.
Here are some top tips from Tom Holloway, Head of Redcentric’s cyber security division, to help you safeguard your assets and data.
Read more about our recent study on unique passwords, how Brits protect their passwords and how they create their passwords.
In an era defined by seemingly unending technological advances, with businesses relying more than ever on digital infrastructure and data, the importance of robust cyber security practices cannot be...
In this article we look at the what, why and how to vulnerability management to help you stay informed and secure.
On May 31, 2023, Progress Software warned the public about a critical SQL injection vulnerability in MOVEit Transfer, allowing unauthorised access to its database. Identified as CVE-2023-34362 on June...
Ransomware has been hitting the UK headlines recently with the severe disruption to Royal Mail’s overseas deliveries, employee data of The Guardian being accessed and Rackspace’s Hosted...
If you’re responsible for an IT setup then a firewall (or even more than one) is essential to keeping your data protected against cyber attacks. But what actually is a firewall and how does it...
Vulnerability scans are to enterprises what health checkups are to people; they’re proactive check-ins on a system’s health to ensure it stays in tip-top running condition. For companies, a...
Like almost every technology innovation ever, for every problem it solves, it trails another along in its wake. Take SD-WAN. It’s a popular choice for those looking for MPLS-level Quality of Service...
Every year, cybercriminals find and take advantage of a corporate system’s vulnerabilities. They feast on open communication protocols and exposed databases that show no sign of regular security...
A third of UK businesses lose customers after a cyber attack. cDiscover how a data centre an support your cyber security.
Productivity tools enable your teams to work better, but with various solutions available how do you start to create your digital workspace?
Choosing the right virtual desktop can be hard. We look at four of the most popular platforms, their pros and cons and our recommendations.
Credential stuffing can leave your business vulnerable. We look at the dangers of credential stuffing and what your business can do to stay protected.
A proactive mindset and a SIEM strategy in place, businesses can massively reduce the risk of a cyber-attack. But what exactly is SIEM? Find out more in this article
Every company needs to backup their system since it’s the only line of defence against several threats that can corrupt or invalidate your data, but you need to make sure your backup is capable of...
HPC isn’t new, – just as data isn’t new. Scientists have been using both for a long time. But the amount of data we collect has grown exponentially in the last few decades and it’s no longer...
Firewalls are an essential part of a company’s cyber security, but there are different types of firewall available and you need to deploy the correct firewall for your company to ensure you are...
DDoS (Distributed Denial of Service) is an effective and dangerous form of cyber attack that requires specific protections in place to defend your IT. How does a DDoS attack work? DDoS attacks flood...