Blog

NIS2: Are you ready?

With the NIS2 Directive now in effect, stricter regulations and expanded scope mean organisations must act quickly—are you ready for NIS2?

Cloud solutions remote workers

A guide to Azure cloud migration

If you’re considering migrating to the cloud, Microsoft Azure is one of the very best solutions – offering a range of features, services, and benefits. But moving your infrastructure to a virtual,...

Understanding the cyber threat landscape

In a world of growing threats, building business resilience is more important than ever. Learn how a risk-based approach can help safeguard your organisation and ensure continued success.

What is a cloud consultant

DBaaS variety: A sweet shop, not a factory

When choosing a DBaaS provider, it's essential to opt for one that offers flexible, tailored solutions that meet your unique business needs, rather than a one-size-fits-all approach.

Why a virtual CISO makes sense for your business

As cyber threats become more advanced, businesses can no longer afford to rely on disjointed security solutions. Recent high-profile breaches like MOVEit (2023) have exposed the vulnerabilities in...

Why resilient businesses succeed

Resilience has been a buzzword for many years, but what does it mean? What are the component parts, and how do you know you have it? We take a look

Remote working securely with Virtual Firewall

An LLM thoughts on using LLM in phishing

This blog highlights the potential misuse of Large Language Models (LLMs) for creating convincing phishing emails and offers tips to help protect organisations from such threats.

Woman working remotely on her laptop in bed

The top 5 security risks of remote working

Working remotely is convenient, but remote employees may unintentionally put your company’s data and networks at risk. Unsecured wi-fi connections, unattended computers, and data breaches are...

redcentric

Redcentric

0800 983 2522 sayhello@redcentricplc.com