blog

GettyImages-545734448 EDIT.jpg
Child Safety Online

"Children must be taught how to think, not what to think." — Margaret Mead, cultural anthropologist

GettyImages-545734448 EDIT.jpg
Your Data: Internet Trackers and Monitoring Your Online Activity

"Getting information from the Internet is like taking a drink from a hydrant." –Mitchell Kapor

GettyImages-545734448 EDIT.jpg
Your Personal Data and The Domino Effect

"Security is always excessive until it's not enough." - Robbie Sinclair, Head of Security, Country Energy, NSW Australia

Cyber score2.jpg
Cybersecurity Checklist - The Five Basic Controls

How Cyber Savvy Are You? Our 25 Cyber Must Knows.

Download this government checklist to reveal how ready you are to fight off a cybercrime attack.

Cloud computing .jpg
We are now G Cloud 11 Certified

We have been certified under the G Cloud 11 Framework to offer a suite of cyber security solutions to UK Government Organisations, including the NHS. 

GettyImages-591404161.jpg
7 Top Reasons To Lease Business IT

Leasing is the purchase model that more and more companies are opting for, according to Gartner, who estimate that by next year, 30% of business devices will be purchased through an opex model. Find out the Seven Top Reasons why.

PenTestBLOG.jpg
Cyber Essentials - Get Certified With Chess

Chess has been announced as a Certification Body for the UK Government Cyber Essentials scheme.

sage 3.jpg
Sage 200cloud - For A More Connected Business

Sage 200cloud is increasingly the solution of choice for businesses looking for the latest technology to manage finance, customers and business insight, with the Spring 2109 release bringing additional benefits.

Coding woman .jpg
Actionable Intelligence with SIEM and UEBA

At the heart of any digital transformation is the harness of data to continually improve customer outcomes and operational excellence.

However, how can organisations be digitally innovative whilst keeping data safe, ensuring it is compliant and enabling the exploitation of data efficiency?

 

INTERCEPT X with EDR verB.png
Sophos Intercept X with EDR Review

This On Demand webinar explores in depth

  • The current and emerging threat landscape
  • Sophos Intercept x + EDR features and capability

 

NHS small_2.jpg
Protecting Windows 10 Within The NHS

Following the Microsoft EA announcement, it’s now more important than ever to adopt a multi-layered approach to protect your Trust.

 

INTERCEPT X with EDR verB.png
The New Weapon in the Battle Against Cyber Crime

The emerging technology that’s offering in house IT teams threat tracking and SOC (Security Operations Center) style capabilities is a significant and welcome step forward in the battle against cyber crime.