• 6375

    Take back control! Respond and Recover from a ransomware attack – Part 3

    Following on from our first two posts on Cyber Resilience (Take back control! Cyber resilience and ransomware – Part 1 and Take back control! Prevent and Detect Ransomware – Part 2) today we look at two other pillars in a Cyber Resilience strategy – Respond and Recover. In part 2, we looked at how a …

    More
  • cyber attack with unrecognizable hooded hacker using virtual reality digital glitch effect

    Take back control! Prevent and Detect Ransomware – Part 2

    Take back control! Prevent and Detect – Pt 2 Following on from our first post on Cyber Resilience (Take back control! Cyber resilience and ransomware – Part 1) today we look at two of the pillars in a Cyber Resilience strategy – Prevent and Detect. Ransomware is likely to be the most prevalent risk to …

    More
  • money male hands background laptop keyboard neon lighting

    Take back control! Cyber resilience and ransomware – Part 1

    Cyber resilience is a wide-ranging subject, and a properly implemented strategy will cover a large range of subject areas, right across the business, from human factors, through detection, response, restoration etc. Cyber resilience is your business’ ability to take back control. To recover with confidence – never paying the ransom and returning to normal business …

    More
  • data gloucestershire

    Yet another M365 backup blog

    Yep, yet another M365 backup blog! It would be relatively easy at this point to re-re-re-re-repeat what’s already been written in a myriad of other blog posts, telling its readers in no uncertain terms that M365 backup is a must, and so important that even Microsoft themselves strongly recommend that you take a 3rd party …

    More
  • wepik export 20240310144059v8CU

    Training IS the problem!!!

    “people are the strongest link; they’re what make your organisation thrive” – This is an NCSC statement, and in my opinion, it is right on the money. However, people are also the biggest risk to your organisations cyber security posture, with an estimated 82% of breaches due to human error. We believe that the problem …

    More