Safeguarding your business: A strategic approach to ransomware defence
In today’s interconnected digital landscape, the threat of ransomware looms large, and the consequences of an attack can be devastating for any business. The common misconceptions of...
UK&I Fortinet Security Day 2024
We are pleased to announce that Redcentric will be attending Fortinet's Security Day on 18th April.
Why Microsoft Copilot (Bing Chat Enterprise) is a real enabler for businesses looking to use AI
Microsoft Copilot's integration into Microsoft licensing packages and security best practices, positions Copilot AI companion for businesses.
Our cybersecurity predictions for 2024
Our experts explore the intricate cybersecurity landscape of 2024, marked by escalating threats, ensuring leadership support and cybersecurity awareness.
Navigating the cybersecurity landscape in the healthcare sector
A look at the top cyber threats and practical solutions to fortify patient data and hospital systems whilst we help you to navigate the cybersecurity landscape.
Vital Data Assets – What are they and why are they a major gap in Cyber-Resilience planning?
This blog explores why organisations often overlook protecting vital data assets (VDAs) that are crucial but not immediately time-critical.
Do cyber-attacks mean that RTOs and RPOs are pointless?
Explore vital cyber security insights: Understanding RTOs, RPOs, and effective data recovery strategies against costly cyber-attacks.
Safeguarding personal and business data: A call to action
With the alarming surge in cyber threats, as Apple reports a 300% increase in personal data breaches. Our cyber security team delves into the need for heightened awareness.
Our thoughts on the NCSC Annual Review
We’ve highlighted some of the headline stats and takeaways from the recently released NCSC Annual Review 2023 report.
Tom’s Ten Tips for protecting your organisation against Ransomware
Here are some top tips from Tom Holloway, Head of Redcentric’s cyber security division, to help you safeguard your assets and data.
How to keep your passwords protected
Read more about our recent study on unique passwords, how Brits protect their passwords and how they create their passwords.
Navigating the constantly evolving cyber security landscape with cutting-edge technology and expertise
In an era defined by seemingly unending technological advances, with businesses relying more than ever on digital infrastructure and data, the importance of robust cyber security practices cannot be...
ScotSoft 2023
We are pleased to announce that we will be attending ScotSoft, one of Scotland's largest software conferences, on the 28th September 2023 at the EICC in Edinburgh.
What is Vulnerability Management?
In this article we look at the what, why and how to vulnerability management to help you stay informed and secure.
MOVEit Transfer Vulnerability
On May 31, 2023, Progress Software warned the public about a critical SQL injection vulnerability in MOVEit Transfer, allowing unauthorised access to its database. Identified as CVE-2023-34362 on June...
Top tips to effectively mitigate cyber-attacks including ransomware
Ransomware has been hitting the UK headlines recently with the severe disruption to Royal Mail’s overseas deliveries, employee data of The Guardian being accessed and Rackspace’s Hosted...
Celebrating success
We were recently invited to celebrate success at an evening hosted by Megabuyte for 2021/22 award winners and alumni. Redcentric delivered a strong financial performance among its peers throughout the...
How does a firewall work? What to know before your next attack
If you’re responsible for an IT setup then a firewall (or even more than one) is essential to keeping your data protected against cyber attacks. But what actually is a firewall and how does it...
Top 10 benefits of vulnerability scanning
Vulnerability scans are to enterprises what health checkups are to people; they’re proactive check-ins on a system’s health to ensure it stays in tip-top running condition. For companies, a...
Secure SD-WAN: peace of mind for your network
Like almost every technology innovation ever, for every problem it solves, it trails another along in its wake. Take SD-WAN. It’s a popular choice for those looking for MPLS-level Quality of Service...
Building an intelligent operating model for the future: The importance of looking ahead
To build an operating model that allows you to respond quickly to business needs, you need to look forward to your roadmap and outside factors. This blog looks at how other customers have built an...
Why does your organisation need vulnerability management?
Every year, cybercriminals find and take advantage of a corporate system’s vulnerabilities. They feast on open communication protocols and exposed databases that show no sign of regular security...
How a data centre can improve your cyber security
A third of UK businesses lose customers after a cyber attack. cDiscover how a data centre an support your cyber security.
Redcentric recognised as Top Enterprise Global 100 MSP
Redcentric is honoured to announce that they have been named in Cloudtango’s 2022 Top Enterprise Global100 MSPs. These prestigious lists recognise the top performing Managed Service Providers (MSPs)...
Redcentric acquires 7 Elements
Redcentric plc, a leading UK IT managed services provider, is pleased to announce the acquisition of 7 Elements. 7 Elements is a CREST accredited and award-winning business which provides industry...
How to create a digital workspace
Productivity tools enable your teams to work better, but with various solutions available how do you start to create your digital workspace?
Which virtual desktop solution is best-suited for your business?
Choosing the right virtual desktop can be hard. We look at four of the most popular platforms, their pros and cons and our recommendations.
Credential Stuffing – what it means, and how it affects your business
Credential stuffing can leave your business vulnerable. We look at the dangers of credential stuffing and what your business can do to stay protected.
What is SIEM and how can it help protect your business?
A proactive mindset and a SIEM strategy in place, businesses can massively reduce the risk of a cyber-attack. But what exactly is SIEM? Find out more in this article
Retail cyber security best practices: A checklist
Did you know that, without sufficient cyber security , your retail business could face fines of up to €20 million? Not only that, but your reputation could also suffer irreparable damage. Indeed,...
Top 5 remote technical support tips for business owners
When was the last time someone leaned over your shoulder and fixed your technical problems with a few clicks? Unless you have a particularly handy spouse (or teenager), the chances are it’s been a...
Hybrid Cloud Security: How to secure your Hybrid Cloud
Hybrid clouds allow organisations to benefit from both public and private cloud models. But how do you keep your hybrid cloud secure? Here are the best practices.
Why you shouldn’t have your system backup stored locally
Every company needs to backup their system since it’s the only line of defence against several threats that can corrupt or invalidate your data, but you need to make sure your backup is capable of...
HSCN Secure Remote Access Tokens FAQs
Secure remote access to HSCN services and data provides clinicians critical information to support them to make informed decisions on the move. Get your questions answered below on HSCN secure remote...
Business impact levels
At Redcentric we’ve a long history of doing business with the public sector, and like anyone else working within this sector we’re well aware of the Government’s Business Impact...
Back to basics – 5 key controls from the cyber essentials scheme
For all the media’s fascination with the apparent inexorability of uber-sophisticated cyber attacks on our nation’s businesses and organisations, recent events have shown that security risks can...
Top 10 tips for choosing a data backup service
Data backup is required by all businesses. With legal requirements tightening and data volumes growing out of control, traditional tape backup is no longer a reliable or cost effective means of...
Did you know? Interesting data and storage facts
As an IT professional with a particular interest in data and Cloud services, I often stumble across nuggets of information that grab my attention. I’m sure I’m not alone in my fondness for facts...
Firewalls Explained: Types of Firewalls
Firewalls are an essential part of a company’s cyber security, but there are different types of firewall available and you need to deploy the correct firewall for your company to ensure you are...
DDoS attack: how can one affect your business?
DDoS (Distributed Denial of Service) is an effective and dangerous form of cyber attack that requires specific protections in place to defend your IT. How does a DDoS attack work? DDoS attacks flood...