Diversity in Tech & Leadership: Just do it!
By Armelle Guillet
Backing up the Cloud: What are the security risks?
GSuite (business) and O365 are rapidly replacing the traditional onsite Exchange and Web server. Moving from on-premises servers to the cloud has many benefits for a company. Being able to access your company’s data and applications from anywhere in the world on just about any electronic device is v …
Where are the women in leadership?
Interview with Jane Honey, guest speaker at our Executive Lunch Roundtable It may seem incredible but the topic of female representation in the workplace and diversity in leadership is still a thorny issue in 2019. Women now make up almost half of the UK’s workforce but are still significantly unrep …
We’re Hiring: Principal Consultant
Principal Consultant
How Information Security has evolved – Part 1
By Hylton Stewart
Diversity in Tech and Leadership: Less Talk, More Action Please
Executive Lunch Roundtable Date & Time Thursday 21st March 2019 12pm – 2pm
Eleven types of Malware and how to avoid them
Spyware, Malware and (the not as common term) Bots – most of us have heard about them and the not so lucky have had first-hand experience with them. The term “Virus” has been the commonplace word for all malicious software programs for years now. I would like to touch on them and go into a little bi …
Could outsourcing IT “Support” grow your business?
Almost every business in the modern world relies on IT at some level to run multiple operations. Communications, project planning and management, customer relations, manufacturing and finance are all powered by IT systems. Therefore, businesses can only be as good as their IT systems.
Spear Phishing – All You Need To Know – Conosco
Information and Cyber Security should be a top priority for any business, but a large number of companies are vulnerable to attacks, simply because of a lack of knowledge and awareness. Conosco offers a holistic programme of Information Security Awareness Training, which starts with educating busine …
An Investment In Knowledge Pays The Best Interest
What makes a great IT support function? What are the pillars for an effective infrastructure? What is the key to building an efficient support team? We could talk about new technology, hardware or software, or it could be a new approach, digital transformation. But instead, how about we get back to …
ISO 27001:2013 Clauses You May Be Overlooking – Supplier Engagement
If you use a third party to process your information, your responsibilities are as follows:
The workplace is no longer an office
Work is not a place where we go, it is what we do. However, when we think about the workplace many people and employers still visualise this as a physical office, when in reality this is rarely the only place where we actually work.