Protect your business from impersonation attacks this Black Friday
Black Friday isn’t just a shopping frenzy, it’s a prime opportunity for cybercriminals to strike. While the focus is often on attracting customers and driving sales, this surge in online activity...
Cyber security belongs in the boardroom, not the back office
In today’s threat landscape, resilience isn’t optional. Find out how forward-thinking organisations are strengthening defences before disruption strikes.
Security and Compliance Webinar: 24th November at 3pm
Tom Holloway, our Head of Cyber Security, joins Legal IT Insider to discuss practical steps law firms can take to strengthen their resilience.
Why a virtual CISO makes sense for your business
This blog explores how a vCISO offers a smarter, more cost-effective way to manage cyber security, helping businesses stay secure in an increasingly complex threat landscape.
Cyber risk – why building risk assessments are important
Discover how combining cyber and physical penetration testing can uncover hidden vulnerabilities and boost your building’s security posture.
Penetration Testing: 7 things to test to identify your cyber security risks
This blog discusses seven critical areas to consider within a tailored penetration testing programme.
Resilience in the face of uncertainty
This blog explores how organisations can navigate uncertainty by strengthening their cyber resilience and preparing for disruption.
From Pentesting to strategy: an important first step
Learn how Pentesting fits into a broader security strategy, why choosing the right partner matters, and how accreditation helps you prove your commitment to protecting your organisation.
Proving you’re secure: the role of Pentesting
Discover how Pentesting helps prove your organisation is secure, why it’s essential for managing real-world risks, and how a tailored approach strengthens your overall InfoSec strategy.
Retail IT Connect
We are excited to share that Redcentric will be attending Retail IT Connect, taking place on 10th-11th June.
Ransomware and UK National Security
In this blog we unpack the latest Parliamentary insights on ransomware, revealing what UK organisations must do now to stay secure.
Improving your security posture and reducing cyber risk
This blog covers key findings from the Government’s latest cyber security survey, revealing evolving threats, rising incidents, and the need for stronger security policies.
vCISO’s corner: budgeting for security initiatives in 2025
Gain insights into how to build a risk-based security budget, understand the challenges and opportunities it addresses, and how to avoid common pitfalls.
Reduce organisational risk by securing your wireless network infrastructure
Discover how advanced wireless security technologies can safeguard your network from modern cyber threats.
NIS2: Are you ready?
With the NIS2 Directive now in effect, stricter regulations and expanded scope mean organisations must act quickly—are you ready for NIS2?
Why choosing a Cyber Essentials certified partner protects your business
Partnering with a Cyber Essentials certified provider ensures robust cyber protection, builds client trust, and supports your business in proactively managing and minimising cyber risks.
Building cyber resilience: The key to reducing cyber risk and boosting insurability
This webinar will provide you with the practical tools and strategies needed to strengthen your cyber defences and improve your organisation’s insurability.
Supporting you through Cyber Essentials accreditations
Staying secure for any size organisation is a top priority. One step that businesses can take is gaining a Cyber Essentials accreditation.
Understanding the cyber threat landscape
In a world of growing threats, building business resilience is more important than ever. Learn how a risk-based approach can help safeguard your organisation and ensure continued success.
An LLM thoughts on using LLM in phishing
This blog highlights the potential misuse of Large Language Models (LLMs) for creating convincing phishing emails and offers tips to help protect organisations from such threats.
Cyber Security Culture and Awareness: not just for October
October is internationally recognised as Cyber Security Awareness month. Yes – we know it’s not October yet, but for our cyber security team it’s Cyber Security Awareness all year round, and...
Small but secure: essential cyber security strategies for small and medium businesses
Our experts share essential cyber security strategies for small and medium sized businesses, so you can grow and innovate in confidence.
The role of the Boards involvement in cyber-security
Successful cyber-attacks continue to make headlines. Three different perspectives on recent events combine to shine a spotlight on one key area for focus and action: the role of the Executive and...
Understanding the growing threat to your cybersecurity from the supply chain
In today’s interconnected world, the supply chain has become an increasingly vulnerable area, posing evolving risks and growing threats to business operations and the delivery of services. By...
Safeguarding your business: A strategic approach to ransomware defence
In today’s interconnected digital landscape, the threat of ransomware looms large, and the consequences of an attack can be devastating for any business. The common misconceptions of...
UK&I Fortinet Security Day 2024
We are pleased to announce that Redcentric will be attending Fortinet's Security Day on 18th April.
Why Microsoft Copilot (Bing Chat Enterprise) is a real enabler for businesses looking to use AI
Microsoft Copilot's integration into Microsoft licensing packages and security best practices, positions Copilot AI companion for businesses.
Our cybersecurity predictions for 2024
Our experts explore the intricate cybersecurity landscape of 2024, marked by escalating threats, ensuring leadership support and cybersecurity awareness.
Navigating the cybersecurity landscape in the healthcare sector
A look at the top cyber threats and practical solutions to fortify patient data and hospital systems whilst we help you to navigate the cybersecurity landscape.
Vital Data Assets – What are they and why are they a major gap in Cyber-Resilience planning?
This blog explores why organisations often overlook protecting vital data assets (VDAs) that are crucial but not immediately time-critical.
Do cyber-attacks mean that RTOs and RPOs are pointless?
Explore vital cyber security insights: Understanding RTOs, RPOs, and effective data recovery strategies against costly cyber-attacks.
Safeguarding personal and business data: A call to action
With the alarming surge in cyber threats, as Apple reports a 300% increase in personal data breaches. Our cyber security team delves into the need for heightened awareness.
Our thoughts on the NCSC Annual Review
We’ve highlighted some of the headline stats and takeaways from the recently released NCSC Annual Review 2023 report.
Tom’s Ten Tips for protecting your organisation against Ransomware
Here are some top tips from Tom Holloway, Head of Redcentric’s cyber security division, to help you safeguard your assets and data.
How to keep your passwords protected
Read more about our recent study on unique passwords, how Brits protect their passwords and how they create their passwords.
Navigating the constantly evolving cyber security landscape with cutting-edge technology and expertise
In an era defined by seemingly unending technological advances, with businesses relying more than ever on digital infrastructure and data, the importance of robust cyber security practices cannot be...
ScotSoft 2023
We are pleased to announce that we will be attending ScotSoft, one of Scotland's largest software conferences, on the 28th September 2023 at the EICC in Edinburgh.
What is Vulnerability Management?
In this article we look at the what, why and how to vulnerability management to help you stay informed and secure.
MOVEit Transfer Vulnerability
On May 31, 2023, Progress Software warned the public about a critical SQL injection vulnerability in MOVEit Transfer, allowing unauthorised access to its database. Identified as CVE-2023-34362 on June...
Top tips to effectively mitigate cyber-attacks including ransomware
Ransomware has been hitting the UK headlines recently with the severe disruption to Royal Mail’s overseas deliveries, employee data of The Guardian being accessed and Rackspace’s Hosted...
Celebrating success
We were recently invited to celebrate success at an evening hosted by Megabuyte for 2021/22 award winners and alumni. Redcentric delivered a strong financial performance among its peers throughout the...
How does a firewall work? What to know before your next attack
If you’re responsible for an IT setup then a firewall (or even more than one) is essential to keeping your data protected against cyber attacks. But what actually is a firewall and how does it...
Top 10 benefits of vulnerability scanning
Vulnerability scans are to enterprises what health checkups are to people; they’re proactive check-ins on a system’s health to ensure it stays in tip-top running condition. For companies, a...
Secure SD-WAN: peace of mind for your network
Like almost every technology innovation ever, for every problem it solves, it trails another along in its wake. Take SD-WAN. It’s a popular choice for those looking for MPLS-level Quality of Service...
Building an intelligent operating model for the future: The importance of looking ahead
To build an operating model that allows you to respond quickly to business needs, you need to look forward to your roadmap and outside factors. This blog looks at how other customers have built an...
Why does your organisation need vulnerability management?
Every year, cybercriminals find and take advantage of a corporate system’s vulnerabilities. They feast on open communication protocols and exposed databases that show no sign of regular security...
How a data centre can improve your cyber security
A third of UK businesses lose customers after a cyber attack. cDiscover how a data centre an support your cyber security.
Redcentric recognised as Top Enterprise Global 100 MSP
Redcentric is honoured to announce that they have been named in Cloudtango’s 2022 Top Enterprise Global100 MSPs. These prestigious lists recognise the top performing Managed Service Providers (MSPs)...
Redcentric acquires 7 Elements
Redcentric plc, a leading UK IT managed services provider, is pleased to announce the acquisition of 7 Elements. 7 Elements is a CREST accredited and award-winning business which provides industry...
How to create a digital workspace
Productivity tools enable your teams to work better, but with various solutions available how do you start to create your digital workspace?
Which virtual desktop solution is best-suited for your business?
Choosing the right virtual desktop can be hard. We look at four of the most popular platforms, their pros and cons and our recommendations.
What is credential stuffing and how does it affect your business?
Credential stuffing can leave your business vulnerable. We look at the dangers of credential stuffing and what your business can do to stay protected.
What is SIEM and how can it help protect your business?
A proactive mindset and a SIEM strategy in place, businesses can massively reduce the risk of a cyber-attack. But what exactly is SIEM? Find out more in this article
Retail cyber security best practices: A checklist
Did you know that, without sufficient cyber security , your retail business could face fines of up to €20 million? Not only that, but your reputation could also suffer irreparable damage. Indeed,...
Top 5 remote technical support tips for business owners
When was the last time someone leaned over your shoulder and fixed your technical problems with a few clicks? Unless you have a particularly handy spouse (or teenager), the chances are it’s been a...
Hybrid Cloud Security: How to secure your Hybrid Cloud
Hybrid clouds allow organisations to benefit from both public and private cloud models. But how do you keep your hybrid cloud secure? Here are the best practices.
Why you shouldn’t have your system backup stored locally
Every company needs to backup their system since it’s the only line of defence against several threats that can corrupt or invalidate your data, but you need to make sure your backup is capable of...
HSCN Secure Remote Access Tokens FAQs
Secure remote access to HSCN services and data provides clinicians critical information to support them to make informed decisions on the move. Get your questions answered below on HSCN secure remote...
Business impact levels
At Redcentric we’ve a long history of doing business with the public sector, and like anyone else working within this sector we’re well aware of the Government’s Business Impact...
Back to basics – 5 key controls from the cyber essentials scheme
For all the media’s fascination with the apparent inexorability of uber-sophisticated cyber attacks on our nation’s businesses and organisations, recent events have shown that security risks can...
Top 10 tips for choosing a data backup service
Data backup is required by all businesses. With legal requirements tightening and data volumes growing out of control, traditional tape backup is no longer a reliable or cost effective means of...
Did you know? Interesting data and storage facts
As an IT professional with a particular interest in data and Cloud services, I often stumble across nuggets of information that grab my attention. I’m sure I’m not alone in my fondness for facts...
Firewalls Explained: Types of Firewalls
Firewalls are an essential part of a company’s cyber security, but there are different types of firewall available and you need to deploy the correct firewall for your company to ensure you are...
DDoS attack: how can one affect your business?
DDoS (Distributed Denial of Service) is an effective and dangerous form of cyber attack that requires specific protections in place to defend your IT. How does a DDoS attack work? DDoS attacks flood...