Safeguarding your business: A strategic approach to ransomware defence
In today’s interconnected digital landscape, the threat of ransomware looms large, and the consequences of an attack can be devastating for any business. The common misconceptions of...
Why Microsoft Copilot (Bing Chat Enterprise) is a real enabler for businesses looking to use AI
Microsoft Copilot's integration into Microsoft licensing packages and security best practices, positions Copilot AI companion for businesses.
Our cybersecurity predictions for 2024
Our experts explore the intricate cybersecurity landscape of 2024, marked by escalating threats, ensuring leadership support and cybersecurity awareness.
Navigating the cybersecurity landscape in the healthcare sector
A look at the top cyber threats and practical solutions to fortify patient data and hospital systems whilst we help you to navigate the cybersecurity landscape.
Vital Data Assets – What are they and why are they a major gap in Cyber-Resilience planning?
This blog explores why organisations often overlook protecting vital data assets (VDAs) that are crucial but not immediately time-critical.
Do cyber-attacks mean that RTOs and RPOs are pointless?
Explore vital cyber security insights: Understanding RTOs, RPOs, and effective data recovery strategies against costly cyber-attacks.
Safeguarding personal and business data: A call to action
With the alarming surge in cyber threats, as Apple reports a 300% increase in personal data breaches. Our cyber security team delves into the need for heightened awareness.
Our thoughts on the NCSC Annual Review
We’ve highlighted some of the headline stats and takeaways from the recently released NCSC Annual Review 2023 report.
Tom’s Ten Tips for protecting your organisation against Ransomware
Here are some top tips from Tom Holloway, Head of Redcentric’s cyber security division, to help you safeguard your assets and data.
How to keep your passwords protected
Read more about our recent study on unique passwords, how Brits protect their passwords and how they create their passwords.
Navigating the constantly evolving cyber security landscape with cutting-edge technology and expertise
In an era defined by seemingly unending technological advances, with businesses relying more than ever on digital infrastructure and data, the importance of robust cyber security practices cannot be...
What is Vulnerability Management?
In this article we look at the what, why and how to vulnerability management to help you stay informed and secure.
MOVEit Transfer Vulnerability
On May 31, 2023, Progress Software warned the public about a critical SQL injection vulnerability in MOVEit Transfer, allowing unauthorised access to its database. Identified as CVE-2023-34362 on June...
Top tips to effectively mitigate cyber-attacks including ransomware
Ransomware has been hitting the UK headlines recently with the severe disruption to Royal Mail’s overseas deliveries, employee data of The Guardian being accessed and Rackspace’s Hosted...
How does a firewall work? What to know before your next attack
If you’re responsible for an IT setup then a firewall (or even more than one) is essential to keeping your data protected against cyber attacks. But what actually is a firewall and how does it...
Top 10 benefits of vulnerability scanning
Vulnerability scans are to enterprises what health checkups are to people; they’re proactive check-ins on a system’s health to ensure it stays in tip-top running condition. For companies, a...
Secure SD-WAN: peace of mind for your network
Like almost every technology innovation ever, for every problem it solves, it trails another along in its wake. Take SD-WAN. It’s a popular choice for those looking for MPLS-level Quality of Service...
Why does your organisation need vulnerability management?
Every year, cybercriminals find and take advantage of a corporate system’s vulnerabilities. They feast on open communication protocols and exposed databases that show no sign of regular security...
How a data centre can improve your cyber security
A third of UK businesses lose customers after a cyber attack. cDiscover how a data centre an support your cyber security.
How to create a digital workspace
Productivity tools enable your teams to work better, but with various solutions available how do you start to create your digital workspace?
Which virtual desktop solution is best-suited for your business?
Choosing the right virtual desktop can be hard. We look at four of the most popular platforms, their pros and cons and our recommendations.
Credential Stuffing – what it means, and how it affects your business
Credential stuffing can leave your business vulnerable. We look at the dangers of credential stuffing and what your business can do to stay protected.
What is SIEM and how can it help protect your business?
A proactive mindset and a SIEM strategy in place, businesses can massively reduce the risk of a cyber-attack. But what exactly is SIEM? Find out more in this article
Why you shouldn’t have your system backup stored locally
Every company needs to backup their system since it’s the only line of defence against several threats that can corrupt or invalidate your data, but you need to make sure your backup is capable of...
High-performance computing: Managing cyber security risk
HPC isn’t new, – just as data isn’t new. Scientists have been using both for a long time. But the amount of data we collect has grown exponentially in the last few decades and it’s no longer...
Firewalls Explained: Types of Firewalls
Firewalls are an essential part of a company’s cyber security, but there are different types of firewall available and you need to deploy the correct firewall for your company to ensure you are...
DDoS attack: how can one affect your business?
DDoS (Distributed Denial of Service) is an effective and dangerous form of cyber attack that requires specific protections in place to defend your IT. How does a DDoS attack work? DDoS attacks flood...