by admin | Nov 1, 2022 | Blog, Cloud, Cyber security
The modern business environment is one of competing priorities. The business needs to make information accessible to help productivity. IT teams and security admins need to lock down information to prevent it being lost or hacked. Both are viable priorities....
by admin | Oct 19, 2022 | Blog, Cyber security
Reports are coming thick and fast reporting a drastic increase in scams targeting the general public using cost of living, energy and discounts. High Street banks and Citizens Advice are calling for people to be aware of a range of scams. Scams include phishing emails...
by admin | Sep 22, 2022 | Blog, Cloud, Cyber security
A recent report by the NCSC (National Cyber Security Centre) advocates the shared responsibility model. This is where clients and cloud providers like Cloud Heroes both have a part to play in data security. Part of the benefit of using cloud solutions is being able to...
by admin | Sep 8, 2022 | Blog, Business Continuity, BYOD, Cyber security
Two-factor authentication (2FA) has strengthened network security significantly and is now used by company networks and many leading platforms. 2FA is seen as an extra layer of security to help boost that of usernames and passwords. It is used across enterprise to...
by admin | Aug 31, 2022 | Blog, BYOD, Cyber security
You have very probably heard a lot about the two vulnerabilities to Apple devices over the past couple of weeks, but did you consider how it would affect BYOD? If your company has a Bring Your Own Device (BYOD) policy and have iPhones, iPads or Macs using your...
by admin | Aug 24, 2022 | Blog, Cyber security
Multisite networks were developed to tackle two key business challenges. The first, to securely connect geographically diverse locations. The second, to provide that connection without the expense of private leased lines. Leased lines are great in some situations and...