
What is SIEM and how can it help protect your business?
A proactive mindset and a SIEM strategy in place, businesses can massively reduce the risk of a cyber-attack. But what exactly is SIEM? Find out more in this article
A proactive mindset and a SIEM strategy in place, businesses can massively reduce the risk of a cyber-attack. But what exactly is SIEM? Find out more in this article
Did you know that, without sufficient cyber security , your retail business could face fines of up to €20 million? Not only that, but your reputation could also suffer irreparable damage. Indeed,...
When was the last time someone leaned over your shoulder and fixed your technical problems with a few clicks? Unless you have a particularly handy spouse (or teenager), the chances are it’s been a...
Hybrid clouds allow organisations to benefit from both public and private cloud models. But how do you keep your hybrid cloud secure? Here are the best practices.
Every company needs to backup their system since it’s the only line of defence against several threats that can corrupt or invalidate your data, but you need to make sure your backup is capable of...
Secure remote access to HSCN services and data provides clinicians critical information to support them to make informed decisions on the move. Get your questions answered below on HSCN secure remote...
At Redcentric we’ve a long history of doing business with the public sector, and like anyone else working within this sector we’re well aware of the Government’s Business Impact...
For all the media’s fascination with the apparent inexorability of uber-sophisticated cyber attacks on our nation’s businesses and organisations, recent events have shown that security risks can...
Data backup is required by all businesses. With legal requirements tightening and data volumes growing out of control, traditional tape backup is no longer a reliable or cost effective means of...
As an IT professional with a particular interest in data and Cloud services, I often stumble across nuggets of information that grab my attention. I’m sure I’m not alone in my fondness for facts...
Firewalls are an essential part of a company’s cyber security, but there are different types of firewall available and you need to deploy the correct firewall for your company to ensure you are...
DDoS (Distributed Denial of Service) is an effective and dangerous form of cyber attack that requires specific protections in place to defend your IT. How does a DDoS attack work? DDoS attacks flood...