by admin | Sep 8, 2022 | Blog, Business Continuity, BYOD, Cyber security
Two-factor authentication (2FA) has strengthened network security significantly and is now used by company networks and many leading platforms. 2FA is seen as an extra layer of security to help boost that of usernames and passwords. It is used across enterprise to...
by admin | Aug 24, 2022 | Blog, Cyber security
Multisite networks were developed to tackle two key business challenges. The first, to securely connect geographically diverse locations. The second, to provide that connection without the expense of private leased lines. Leased lines are great in some situations and...
by admin | Jul 13, 2022 | Security
Researchers have identified the growth of a strain of malware called ZuoRAT that has been infecting SOHO routers across Europe and North America. The malware is very sophisticated and has been targeting Small Office Home Office (SOHO) routers from some of the biggest...
by admin | Jul 13, 2022 | Communications
The challenge One of the most common challenges we see within business is the use of multiple systems, none of which can talk to each other. It’s a barrier to progress and can definitely impact productivity. A phone that cannot communicate with mobile, or cannot send...
by admin | Jul 13, 2022 | Cloud Guidance
The UK’s cyber security body, the National Cyber Security Centre (NCSC) has released a new version of their cloud guidance for British business and organisations planning to migrate to the cloud. The refreshed cloud guidance has been brought right up to date and is...