How Information Security has evolved – Part 1

How Information Security has evolved – Part 1

By Hylton Stewart

Mar 18, 2019 2 min read
Diversity in Tech and Leadership: Less Talk, More Action Please

Diversity in Tech and Leadership: Less Talk, More Action Please

Executive Lunch Roundtable Date & Time Thursday 21st March 2019 12pm – 2pm

Mar 14, 2019 1 min read
Eleven types of Malware and how to avoid them

Eleven types of Malware and how to avoid them

Spyware, Malware and (the not as common term) Bots – most of us have heard about them and the not so lucky have had first-hand experience with them. The term “Virus” has been the commonplace word for all malicious software programs for years now. I would like to touch on them and go into a little bi …

Mar 4, 2019 4 min read
Could outsourcing IT “Support” grow your business?

Could outsourcing IT “Support” grow your business?

Almost every business in the modern world relies on IT at some level to run multiple operations. Communications, project planning and management, customer relations, manufacturing and finance are all powered by IT systems. Therefore, businesses can only be as good as their IT systems.

Feb 13, 2019 2 min read
Spear Phishing – All You Need To Know – Conosco

Spear Phishing – All You Need To Know – Conosco

Information and Cyber Security should be a top priority for any business, but a large number of companies are vulnerable to attacks, simply because of a lack of knowledge and awareness. Conosco offers a holistic programme of Information Security Awareness Training, which starts with educating busine …

Feb 5, 2019 2 min read
An Investment In Knowledge Pays The Best Interest

An Investment In Knowledge Pays The Best Interest

What makes a great IT support function? What are the pillars for an effective infrastructure? What is the key to building an efficient support team? We could talk about new technology, hardware or software, or it could be a new approach, digital transformation. But instead, how about we get back to …

Jan 26, 2019 3 min read
ISO 27001:2013 Clauses You May Be Overlooking – Supplier Engagement

ISO 27001:2013 Clauses You May Be Overlooking – Supplier Engagement

If you use a third party to process your information, your responsibilities are as follows:

Dec 20, 2018 3 min read
The workplace is no longer an office

The workplace is no longer an office

Work is not a place where we go, it is what we do. However, when we think about the workplace many people and employers still visualise this as a physical office, when in reality this is rarely the only place where we actually work.

Dec 4, 2018 3 min read
We’re Hiring: Client Manager

We’re Hiring: Client Manager

Client Manager

Nov 30, 2018 1 min read
Tick-box compliance is a lost opportunity

Tick-box compliance is a lost opportunity

When you get the opportunity to speak with an Information Security expert, it’s inevitable that GDPR will come up at some point in the conversation. Following our recent executive round table I had the opportunity to chat to our guest Patrick Wheeler, a renowned expert in the field of Information an …

Nov 12, 2018 3 min read
Why business leaders should not ignore cyber-security

Why business leaders should not ignore cyber-security

At a recent executive round table hosted by Conosco, we had the privilege to be joined by Patrick Wheeler, a renowned expert in the field of Information and Cyber Security. I got the opportunity to spend some additional time with Patrick and capture some of his thoughts to share.

Nov 4, 2018 2 min read
Information & Cyber Security – Your Questions Answered

Information & Cyber Security – Your Questions Answered

According to the Institute of Directors (IoD), there are more than 7 million cyber-crime attacks on small to mid-sized businesses in the UK every year. These attacks are both persistent and sophisticated, presenting a very real and serious risk to businesses.

Oct 18, 2018 4 min read