Hotel Technology Due Diligence
Tuesday, 13 September 2022
A hotel can’t run well without up-to-date and effective technology. Gone are the days of handwritten logbooks and ‘analogue’ check-ins. Having outdated or broken technology is about as bad as having leaky pipes and bad insulation – both make your guests’ stay less pleasant, and their return less likely. Conducting a technology due diligence on
- Published in IT Consultancy
No Comments
5 ways your employees can compromise your cyber security in 2022
Tuesday, 02 August 2022
More than 80% of UK businesses faced a cyberattack over the last year. Many of these attacks were caused by employees. It’s usually unintentional – the employees might not be well trained in cyber-security protocols, or worse yet, they may not be following that training. Here are 5 ways your employees could be a risk to your business’s cybersecurity.
- Published in Cyber Security
It is time to switch your ISDN to SIP for your business calling
Wednesday, 27 July 2022
A few years ago, Openreach announced that ISDN phone lines will be switched off in 2025. If your business is still using the outdated network, now is the time to switch. ISDN’s successor, SIP Trunking, is a faster, cheaper, and more flexible alternative. Any change can be daunting. Luckily, the switch from ISDN to SIP is likely
- Published in Guidance
How to Prevent Ransomware Attacks
Tuesday, 26 July 2022
Ransomware attacks are becoming a popular method of cybercrime. In 2021 alone, there were a reported 500 million ransomware attacks. Preventing these kind of attacks on your business is critical. Here we will discuss what ransomware is, how to prevent these attacks and what to do if you do become the victim of it. What
- Published in Cyber Security
Insider Threats
Monday, 20 June 2022
Cybersecurity infrastructure is vital for your business continuity. We have talked in previous blog articles about some of the best ways to keep your business safe from outside attacks. It is, however, important to remember that not all threats or attacks come from the outside. What are Insider Threats Insider threats come from within the
- Published in Cyber Security
Penetration Testing
Tuesday, 14 June 2022
If you only find out where your security weaknesses are after they’ve been exploited, you’ve found out too late. The best cyber security strategy is a proactive one, and a hallmark of proactive cyber security is the use of penetration testing. What is Penetration Testing? A penetration test is an authorized attack on your business’s IT
- Published in Cyber Security