August 19, 2022

What is the right penetration test for your organisation?

What is the right penetration test for your organisation? Picking the right penetration test for your business can be difficult. There are many different factors to […]
August 3, 2022

Put your defences to the test with Continuous Security Validation

Put your defences to the test with Continuous Security Validation Penetration Testing can be a great way to test your network for weaknesses and identify any […]
July 20, 2022

Look to the Future with Digital Transformation

Look to the Future with Digital Transformation We have seen huge changes in IT in recent years. You only have to look back ten years to […]
April 5, 2022

Dispelling Myths About Remanufactured Laptops

Dispelling Myths about Remanufactured Laptops Did you know that the IT industry contributes over 2% of global carbon dioxide emissions? Organisations are becoming more aware of […]
March 24, 2022

Modernising your IT Procurement Process with eacs Selector

Modernising your IT Procurement Process with eacs Selector For many businesses, things are beginning to get back to some sort of normality, although IT procurement and […]
February 21, 2022

Supporting a Remote Workforce with the Hybrid Cloud

Supporting a Remote Workforce with the Hybrid Cloud With restrictions now lifted in the UK, many organisations will be pondering whether to bring employees back into […]
February 2, 2022

How can Schools Combat Ransomware Attacks?

How can Schools Combat Ransomware Attacks? In the past year, ransomware has risen to new heights, with education being one of the worst hit sectors. Sophos […]
December 9, 2021

What’s Next for the IT Security Team?

What’s Next for the IT Security Team? IT has played a critical role in enabling businesses to remain operational throughout the past 18 months, from providing […]
November 24, 2021

What is Zero Trust and Why is it Important?

What is Zero Trust and Why is it Important? Trust no one and nothing. Always verify. That is the overarching theme of the Zero Trust model. […]