What is GDPR

The General Data Protection Regulation (GDPR) will come into effect from the 25th of May 2018 and aims to bring data protection legislation in line with the ways in which data is currently used. One of the key findings from our UK Cloud Snapshot Survey 2017 report was that 62% of respondents highlighted GDPR as the biggest challenge to their IT plans over the next 3 years. Adherence with GDPR in the opinion of one interviewee was “bigger than anything else the company has had to deal with”. 

Cyber Security Solutions

We use a number of methods and vendors to help completely secure our customers data. Backups for ransomware protection, password managers for credentials, multi-factor authentication, anti-spoof & anti-phishing protection, RADIUS authentication and device audit and management. Read more about how we help organisations.

Azure ExpressRoute

Provisioning connections between data centres and external services has always been a problem. Which is why only 28.3% of organisations use a Cloud Connect model to services such as Azure and AWS. Now you can consolidate multiple cloud vendors into a single user interface, quickly and simply deploy multi-cloud environments. Interconnect as your cloud business model: no lock-in contracts, pay-as-you-go, and you only pay for what you need.

Data Sovereignty

Ensure you achieve the best possible data centre or cloud technical, commercial and compliance fit for your business. We have the industry and market knowledge regarding Data Centre and Cloud to help you eliminate what can be a frustrating and time consuming exercise. We monitor data centre capacity, managed services, new data centre builds, costs, availability and cloud suitability.

General Data Protection Regulation GDPR

Many businesses are confused by the regulation of the GDPR and find them almost impossible to translate into a set of controls to implement across the organisation. With just one purchase you can now put in place the security baseline you need in order to meet the legislation and get compliant.

Cyber-fraud and Bitcoin

Bitcoin, has risen to fame in recent years and become especially prevalent due to the recent media coverage linked to cyber-fraud, particularly the WannaCry ransomware attack. They’re anonymous and not in the control of banks and governments. Despite its affiliations with the illegal economy, and the association with cyber-fraud, major banks and companies across the world are in talks to adopt digital currencies such as Bitcoins.

Microsoft Azure Glossary

Microsoft Azure is a cloud service from the global software giant, Microsoft. Azure offers a vast range of useful compute and application resources. These are all offered on-demand and in a cost-effective manner which helps businesses scale and grow. Hopefully, like me, you can learn from this glossary even complicated sounding terminology usually has a simple explanation. Which can be useful when developing your knowledge on technical topics.

Ransomware Business Continuity

Incidents infecting hundreds of thousands of computers globally bring problems into rather sharp focus. Ransomware has been with us for many years. We’ve seen a number of customer cases that prove it’s possible to survive these attacks. Without having to pay. As the ransomware threat continues, it’s imperative to understand how you can protect your business. Having a strategy is a really good start.

Top 10 Reasons to Use Office 365

Our top 10 reasons to use Office 365 should include the Hybrid option, then you don’t have to make a choice between cloud or on-premise. You get the best of both worlds. For the majority of businesses, Office 365 makes much more sense, and Microsoft is not a consumer-grade advertising provider. Here are our Top 10 reasons why we think Office 365 is best.

Cloud Security

Cloud Security has been a serious issue since the concept of the cloud began. The classic example was initially the discomfort of a shift from physically seeing the IT security infrastructure to simply trusting someone else with it virtually. One way to ensure a full understanding of cloud security, and security in general, is to understand the levels of your infrastructure that require protection.