News & Views.

How to protect yourself from a Bluetooth cyber attack
Bluetooth technology is widely used because it can quickly connect one electronic device with another close by. However, it is vulnerable to “Bluesnarfing” cyber attacks. Here we tell you how

Why security is key to driving IT innovation for modern businesses?
Digital innovation, deployed correctly, can transform small and medium-sized businesses (SMBs). But this transformation can bring risks. Businesses need to ensure their security layer remains robust, without slowing innovation. Research

Technology, People and Policy – Creating a 360° Cyber Security Strategy
Today, businesses operate in the digital realm to a greater degree than ever before. Offering extended global reach and the potential to explore new, innovative ways of working, plus greater

How to maximize cloud efficiency, security and scalability
Businesses must learn to harnesses the power of the cloud. Despite a turbulent world economy, the global cloud market is booming, with a nearly £500 billion market in 2022 that is estimated

Managing cloud cyber security
As cloud computing continues to reshape the business world, the need to ensure the security of this complex new environment is more important than ever. This comes with its own significant challenges.

Steps of a cyber security Risk Assessment
The National Institute of Standards and Technology (NIST) publishes various resources, including cybersecurity best practices. Among these are a six-step process for performing a cyber security risk assessment. The six steps