The recent global pandemic has brought a new wave of advancements to the technology industry. However, it has also brought along with it, some new problems – problems that only seem to be getting worse. While cybercrime continues to grow at an alarming rate, businesses in all sectors are facing a severe cybersecurity talent drought. […]
End-to-end cloud transformation Background & OverviewFounded in 1868 with locations in all major political and financial centres around the globe, The Royal Institution of Chartered Surveyors (RICS) is the world’s leading professional body for qualifications and standards in land, property, infrastructure and construction. Employing more than 1,500 staff, with over 130,000 accredited professionals worldwide and […]
Rapid deployment of microsoft vdi to enable immediate remote working. Background & Overview Elysium Healthcare is a privately-owned provider of mental health services within the UK. Conceived in December 2016, the company bought together multiple strategic sites from the portfolio of Partnerships in Care and The Priory Group when they were sold by Acadia Healthcare. […]
Background & OverviewFounded in 1988, Cygnet Health Care has, for more than 30 years, provided specialist mental health treatment, rehabilitation and support services, working closely with the NHS to ensure the highest quality of care is provided to all patients. With a dedicated care team of more than 8,800 employees, working across 150 sites nationally, […]
Delivering Secure Cloud Transformation utilising the Zscaler Cloud Security Platform Background & OverviewEstablished in 1996 Currencies Direct was the first non-bank foreign exchange provider in Europe. Today, Currencies Direct stands out in the foreign exchange industry for its unique combination of payments technology with personalised support, offering straightforward payments solutions to businesses operating in international […]
“Cyber criminals are operating at scale; If you’re the weakest member of the herd, you’re likely to be taken down first.”Security Bytes bring you all the latest cyber security know-how in bite sized chunks. “Cyber security user awareness training” Did you know your employees are the weakest link in your cyber security? Discover the importance […]
Cloud migration cost calculator: What’s the total cost of ownership (TCO)? Moving to the cloud will realise untold benefits with significant cost advantages. But the reality is that cloud migration can be complex and without effective analysis and planning can leave you being faced with unexpected costs and a bit of a runaway train. Why […]
London, 22nd March 2016: Networking Plus Magazine – Information security is not keeping pace with growing risk, according to the Institute of Information Security Professionals (IISP).
London, 21st October 2015: Networking Plus Magazine – More than half of UK organisations look to managed services to improve customer experience, yet over 50 per cent of enterprise IT infrastructure is still entirely managed in-house, according to research by IDG.
In Part 3 and final post in our Ransomware series, we take a look at how to defend against a ransomware attack. How do you best prime your defences?
Few will have missed the largescale ransomware attack on 12th May 2017, particularly affecting the NHS, but disrupting operations at more than 100,000 organisations in 150 countries. If we didn’t yet fully comprehend the existing threat from ransomware, we now do – unfortunately.
Firms worldwide, major government departments and government infrastructure have been hit by yet another ransomware attack, affecting many European countries, particularly the Ukraine, but also in the Netherlands and the UK, amongst others – (as of Tuesday 27th June)
Already with an impressive set of features, SolarWinds’ Network Performance Monitor (NPM) sets the benchmark for performance monitoring to provide end-to-end visibility of your network, and reduce network outages and quickly detect, diagnose, and resolve network performance issues. SolarWinds NPM 12.3 features And with the release of NPM 12.3 (released 31st May 2018), the feature […]
How Cloud Computing can help organisations to succeed? With the widespread adoption of cloud services such as Office 365 and Salesforce.com, many businesses have already made the first step towards moving to the cloud. But the truth is, transitioning from an established IT infrastructure to a cloud-first business model was not top of the agenda […]
Threat Intelligence (CRITICAL UPDATE) Previously reported in 17 December 2019, a vulnerability has been identified in Citrix NetScaler ADC and Citrix Netscaler Gateway, which could allow an unauthenticated attacker to perform arbitrary code execution.
In a changing world, companies are looking to Virtual Desktops (VDI) to solve remote working challenges. However often come across further challenges such as network connectivity, user experience, functionality and performance issues. Today, a modern virtualisation solution such as Window’s Virtual Destop (WVD) is more than just a single piece of software, it is considered […]
Whether your are self-employed, work for a small business, or indeed a large multi-national, for a while, working from home is going to become the new norm. Yet even in these challenging times, we’ve seen cyber criminals preying on people’s fears, using the Coronavirus as just another opportunity. For this reason, it is essential for […]
In the past week, we’ve had a number of our customers requesting rapid, low cost and secure remote working solutions for their office-based employees… without a long-term commitment. – Low cost – Rapid to deploy – Easy to scale-up & scale down In challenging times, customers are looking for guidance on how to rapidly enable […]
March 2020 Threat Intelligence (CRITICAL ALERT)
Have you ever considered who’s there to help you when your network crashes or if you’re having trouble accessing your stored files? What about if your network goes down out of hours? Depending on your current company infrastructure, the answer could be a NOC (Network Operations Center) or an IT help desk. You may be […]
The World Health Organisation (WHO) has released an official statement to say we should all do more to prepare for a possible Coronavirus pandemic. The WHO have also said that all countries should be in “a phase of preparedness”. Of course, this means taking precautions when in public areas. But as a business, we need […]
This is not meant to seem complicated, but firstly, to understand what Zscaler Private Access (ZPA) is, what it does… and why, it may be useful to understand a little bit about Zscaler Inc., courtesy of Wikipedia: “Zscaler is a cloud-based information security platform delivered through more than 100 global data centres. To use Zscaler, […]
February 2020 Threat Intelligence (CRITICAL ALERT)
What’s the recommended network architecture requirement for Office 365? Many enterprises have experienced performance issues after migrating to O365, as well as significant increases in bandwidth usage. All of which has resulted in troublesome deployments and a poor user experience. The underlying cause of the problem is the need to meet Microsoft’s network architecture & […]