Archive for author: Lindsey Hall

Expert Articles Strategy and policy

Off the shelf or bespoke? Which type of software is right for me?

Off the shelf or bespoke? Which type of software is right for me?

You have a business problem.  You know IT could help you solve it.  But you don’t know where to begin.  Have you ever been in that position?

The starting point is often to think about whether someone has already invented a solution that you could purchase and configure for your needs.  These are often referred to as ‘off-the-shelf’ or ‘third-party’ solutions.

The more generic the challenge, the more likely somebody has invented a solution.

Online accounting packages are a good example.  Every business from the smallest to the biggest needs to understand its income and expenditure.  Type “Online accounting software” into any search engine and you will see that there is a lot of competition for your business.

Uncategorized

Microsoft offers UK data centres for cloud data that is subject to compliancy and contract limitations

For some organisations, the geographical location of cloud data has proven an impediment to moving their own systems in that ...

Uncategorized

A phenomenon becoming known as “cyber security fatigue” is developing

On a daily basis now, I am having conversations with worried managers and directors regarding cyber security. The constant bo...

Uncategorized

IT and sausages: you want the tasty outcome, but it’s best not to watch it in the making

A management view of IT often follows the analogy about legislation and sausages: you want the tasty outcome, but it’s ...

Uncategorized

Security advisory: Spear Phishing after your money

Over the past 6 months, a type of email fraud has come to the fore which has started to provoke concern …. and rightly...

Should I be concerned about cyber security and where can I start?
Cyber security and resilience Expert Articles Learning Centre

Should I be concerned about cyber security and where can I start?

Should I be concerned about cyber security and where can I start?

The threat of cyber crime is a very real one. However, there is a big difference between being sufficiently concerned that you take action and being so terrified that you behave irrationally or do nothing at all.

The problem with fear is that it sometimes drives the wrong behaviour. Faced with a predator, our instinct can be flight rather than fight. Cyber crime is not a challenge from which to run away or bury our heads in the sand and hope the aggressor picks on someone else.

Cyber security and resilience Expert Articles Learning Centre

8 common cyber crimes that affect you!

We all know what bank robbers and burglars do.  Understanding their common tools and techniques helps us to design appropriate defence mechanisms.  Cyber crime is no different.  Recognising the different tricks of the trade empowers us to implement the cyber equivalent of locking the door or fitting an alarm.

How many of the following 8 common tactics employed by cyber criminals have you heard of?

Uncategorized

Security advisory: Google Chrome uses targeted by “Font wasnt found” scam

Please be aware that a new infection technique is doing the rounds; targeting Google Chrome users. The “font wasn&rsquo...

Uncategorized

Peterborough Gigabit network down for over 5 hours overnight

Our monitoring systems indicate the Peterborough Core fibre network was down from 19:30 until around 01:30 overnight. The (no...

EasylifeIT™ Blog

Centrally manage your team email signatures on Office 365

For those who are brand or legally conscious the appearance and content of your teams email signatures is of some importance. With so much communication these days via email from desktops, laptops and mobile devices, it is almost impossible to keep everyone’s presentation and standardised. Factor in a change of branding or a new promotion and it becomes a complete headache if you have any number of staff. If this is you; then you should perhaps consider CodeTwo’s excellent offering in this area.