Why you shouldn’t have your system backup stored locally
Every company needs to backup their system since it’s the only line of defence against several threats that can corrupt or invalidate your data, but you need to make sure your backup is capable of...
HSCN Secure Remote Access Tokens FAQs
Secure remote access to HSCN services and data provides clinicians critical information to support them to make informed decisions on the move. Get your questions answered below on HSCN secure remote...
Business impact levels
At Redcentric we’ve a long history of doing business with the public sector, and like anyone else working within this sector we’re well aware of the Government’s Business Impact...
Back to basics – 5 key controls from the cyber essentials scheme
For all the media’s fascination with the apparent inexorability of uber-sophisticated cyber attacks on our nation’s businesses and organisations, recent events have shown that security risks can...
Top 10 tips for choosing a data backup service
Data backup is required by all businesses. With legal requirements tightening and data volumes growing out of control, traditional tape backup is no longer a reliable or cost effective means of...
Did you know? Interesting data and storage facts
As an IT professional with a particular interest in data and Cloud services, I often stumble across nuggets of information that grab my attention. I’m sure I’m not alone in my fondness for facts...
Firewalls Explained: Types of Firewalls
Firewalls are an essential part of a company’s cyber security, but there are different types of firewall available and you need to deploy the correct firewall for your company to ensure you are...
DDoS attack: how can one affect your business?
DDoS (Distributed Denial of Service) is an effective and dangerous form of cyber attack that requires specific protections in place to defend your IT. How does a DDoS attack work? DDoS attacks flood...