<img src="https://www.visionary-agile24.com/801599.png" style="display:none;">
Spear Phishing – All You Need To Know – Conosco

Spear Phishing – All You Need To Know – Conosco

Information and Cyber Security should be a top priority for any business, but a large number of companies are vulnerable to attacks, simply because of a lack of knowledge and awareness. Conosco offers a holistic programme of Information Security Awareness Training, which starts with educating busine …

Feb 5, 2019 2 min read
An Investment In Knowledge Pays The Best Interest

An Investment In Knowledge Pays The Best Interest

What makes a great IT support function? What are the pillars for an effective infrastructure? What is the key to building an efficient support team? We could talk about new technology, hardware or software, or it could be a new approach, digital transformation. But instead, how about we get back to …

Jan 26, 2019 3 min read
ISO 27001:2013 Clauses You May Be Overlooking – Supplier Engagement

ISO 27001:2013 Clauses You May Be Overlooking – Supplier Engagement

If you use a third party to process your information, your responsibilities are as follows:

Dec 20, 2018 3 min read
The workplace is no longer an office

The workplace is no longer an office

Work is not a place where we go, it is what we do. However, when we think about the workplace many people and employers still visualise this as a physical office, when in reality this is rarely the only place where we actually work.

Dec 4, 2018 3 min read
We’re Hiring: Client Manager

We’re Hiring: Client Manager

Client Manager

Nov 30, 2018 1 min read
Tick-box compliance is a lost opportunity

Tick-box compliance is a lost opportunity

When you get the opportunity to speak with an Information Security expert, it’s inevitable that GDPR will come up at some point in the conversation. Following our recent executive round table I had the opportunity to chat to our guest Patrick Wheeler, a renowned expert in the field of Information an …

Nov 12, 2018 3 min read
Why business leaders should not ignore cyber-security

Why business leaders should not ignore cyber-security

At a recent executive round table hosted by Conosco, we had the privilege to be joined by Patrick Wheeler, a renowned expert in the field of Information and Cyber Security. I got the opportunity to spend some additional time with Patrick and capture some of his thoughts to share.

Nov 4, 2018 2 min read
Information & Cyber Security – Your Questions Answered

Information & Cyber Security – Your Questions Answered

According to the Institute of Directors (IoD), there are more than 7 million cyber-crime attacks on small to mid-sized businesses in the UK every year. These attacks are both persistent and sophisticated, presenting a very real and serious risk to businesses.

Oct 18, 2018 4 min read
Information & Cyber Security – there is a lot to think about

Information & Cyber Security – there is a lot to think about

On Thursday 11th October, Conosco hosted an executive round table focused on the issue of Information and Cyber Security. There is no better way of truly understanding the challenges that businesses face than to listen to the people that are facing these challenges on a day to day basis.

Oct 16, 2018 2 min read
‘The Office of the CTO’ delivers strategic value to clients

‘The Office of the CTO’ delivers strategic value to clients

London, Monday 8th October 2018 – We have announced the appointment of Amit Dattani in the role of Director of Technology to create ‘The Office of the CTO’.

Oct 8, 2018 1 min read
Thinking Differently About IT: The Trigger Points

Thinking Differently About IT: The Trigger Points

Your business is growing, and you have all the plans in place to increase sales, to deliver differentiated services and maybe even to expand into new markets or new geographies. At some point, you will hit some ‘bumps in the road’ and will have to make some operational changes to overcome these. It …

Oct 5, 2018 2 min read
Social Engineering – A People Problem

Social Engineering – A People Problem

Cyber attacks take many forms but social engineering is a particularly pernicious tactic which can have serious implications for your IT security.

Sep 3, 2018 3 min read