Ensuring home working benefits staff, families and organisations alike

Ensuring-home-working-benefits-staff-families-and-organisations-alik_20200618-130912_1
There's no doubt that home working is here to stay. While it may have initially been deployed at large scale out of necessity, in response to COVID-19, it is clear that we are witnessing the dawn of a fully distributed workforce. However, as organisations continue to invest in new solutions to drive this change, it's important to remember that these are still the early days. We've never seen home working at this sort of scale, which means we need to establish a new standard of best practice and - equally importantly - the technology to support this.
Continue reading
  164 Hits
164 Hits

From heads in the Cloud to eyes in the Cloud

From-heads-in-the-Cloud-to-eyes-in-the-Clou_20200615-094913_1

Cloud adoption has been rising year by year for some time now, with Gartner predicting this trend to accelerate beyond 2020. It has long moved on from its earliest days, where it was largely regarded as an intriguing concept but unsuitable for enterprise-level applications. Now, with a wide range of options available - including Public, Private and Hybrid solutions - it has become a highly attractive prospect for organisations at all levels, especially against the backdrop of COVID-19 and the resulting advancement of remote working. While these trends are very much the latest stage in a long process of transformation, the pandemic has undoubtedly been the catalyst behind much recent Cloud adoption, as organisations accelerate their journeys towards a distributed workforce. 


So, where does that leave us in terms of the biggest question: "Is Cloud right for my organisation?"

Continue reading
  155 Hits
155 Hits

Culture and technology: getting UK business’ through lockdown

Culture-and-technology-getting--UK-business-through-lockdown

The past few months have certainly been challenging for businesses all over the UK - from start-ups to established industry leaders. Organisations have found themselves adapting to the demands of a remote workforce virtually overnight, deploying communications solutions to enable their teams to engage with both each other and their customers. While it's true that this technology has been available for a while now, it has never been deployed at this scale before. This has presented a range of challenges when it comes to infrastructure, but these are only part of the picture.

Continue reading
  132 Hits
132 Hits

Will COVID-19 turbocharge how Charities manage their Cyber Security Infrastructure?

Covid-charity Will COVID-19 turbocharge how Charities manage their Cyber Security Infrastructure?
A number of charities have their IT foundations built on historical infrastructure and systems which are hard to appropriately protect. Within the cur...
Continue reading
  94 Hits
94 Hits

IT providers come of age, as trusted partners for companies across the UK

IT-providers-come-of-age-as-trusted-partners-for-companies-across-the-UK
COVID-19 has forced organisations across the UK to re-evaluate virtually every aspect of how they operate, from policies regarding remote working, to the security of their data. There's no doubt that the IT landscape has been fundamentally transformed by these challenges, as new innovations have been unveiled and deployed at an unprecedented pace. None of this could have been achieved without businesses and IT providers working hand-in-hand to meet the challenges presented by the pandemic.
Continue reading
  88 Hits
88 Hits

Why the security of Unified Communications must be a key priority

UC-Security-blog
There's no doubt that Unified Communications have never been in such high demand as in recent months. The current global pandemic has meant the need f...
Continue reading
  95 Hits
95 Hits

The recent evolution of the Cyber Threat landscape for Financial Services

The-recent-evolution-of-the-Cyber-Threat-landscape-for-Financial-Services

As the Financial Services (FS) industry continues to adopt and leverage digital technologies to innovate and deliver customer-centric outcomes, there is also a major focus on inward change, on improving employee experience through streamlining, simplifying and consolidating platforms, infrastructure and processes. Of course, Digital Transformation comes with an abundance of risks. Some of these are already widely recognised and covered by the mainstream media, some are newly emerging, and others are as yet unknown.

Continue reading
  1971 Hits
1971 Hits

Cyber security expertise and the global skills gap

Cyber-Security-Skills-Gap_Large
By 2019, 1 to 2 million roles within cyber security will be unfulfilled. That's a figure that should strike fear into the heart of even the most stoic...
Continue reading
  1079 Hits
1079 Hits

The changing faces of security

The-Changing-Face-of-Security

Cyber security is more complex now than ever before, and the implications of a cyber-attack can be much more disastrous. Organisations must consider not only the financial implications but the reputational damage that can arise following an attack. The proliferation of social platforms and the increasing needs of regulation, mean that security breaches can be publicised across the globe within minutes. Whilst the cost of launching a cyber-attack has reduced over the last few years, the cost of defence has risen. This is because there's a greater variety of attack vectors – means by which an attacker can gain access to your network. The methods deployed are so vast, compared to previously, that it makes it increasingly difficult to build an effective defence against. Highly sophisticated cyber-attacks are also using automation techniques to maximise their damage, to the extent where one piece of code can be used many thousands of times. 

Continue reading
  1081 Hits
1081 Hits

Post-GDPR: key learnings for housing associations

Post-GDPR-Key-Learning-For-Housing-Associations

The GDPR deadline day of 25th May has been and gone, but sticking to the legislation remains as important as ever. This is because GDPR is, in fact, not something that can just be 'done'; instead, it is ongoing and needs to be constantly changed and updated. The onus is on housing associations to comply with GDPR not just today, but in six months, a year, two years, and beyond. 

Continue reading
  1047 Hits
1047 Hits

Stay Alert! Developing a secure home office

Remote-Working-Checklist-Blog3-header
Organisations around the world are moving closer and closer to establishing a new standard of best practice for remote working, with new tools and pro...
Continue reading
  72 Hits
72 Hits

Your launchpad - choosing the right tools for remote working

Remote-Working-Checklist-Blog2-header
​In recent weeks, companies across the UK have found themselves transitioning to a remote workforce with little to no choice, despite the approach pre...
Continue reading
  66 Hits
66 Hits

Playing your part - staying secure while remote working

Remote-Working-Checklist-Blog1-header
Now more than ever, digital security is a team effort, with staff at all levels of an organisation having an active part to play in keeping critical b...
Continue reading
  80 Hits
80 Hits

Rising cyber security threats in manufacturing

Manufacturing-stories

Cyber professionals say that companies involved in the manufacturing industry are more exposed to cyber-attacks. This was revealed by a number of studies produced by the Manufacturers Alliance for Productivity and Innovation (MAPI). According to MAPI; 40% of manufacturing firms experienced a cyber-attack within the last year. Of those attacked, 38% of them suffered over $1 million in damages. 

Continue reading
  60 Hits
60 Hits

How the landscape for remote working will never be the same again

How-the-landscape-for-remote-working-will-never-be-the-same-again
Over the last week, school leaders have risen to the challenges of the current crisis.It is a reminder of the responsiveness and resilience of our education system, and for those that are living on another planet (or wish they were at the moment!), the government is closing schools as of today to the vast majority of students. Children of key (critical) workers are still able to attend to ensure medical and transport staff can remain at work, but what does this mean for the other students?
Continue reading
  59 Hits
59 Hits

Cyber crime: ransomware attacks

Ransomware-banner
 Ransomware is malware that encrypts an individual's files so that they no longer have access to them, and subsequently demand payment for the fi...
Continue reading
  661 Hits
661 Hits

Phishing: attacks and prevention

Phishing-attacks

Phishing is the fraudulent use of electronic communications to try and obtain sensitive information, such as usernames, passwords and credit card details by posing as a legitimate institution. Phishing attacks attempt to get individuals to click on a malicious link and enter confidential information to steal their identity, funds or to be the first step in a serious cyberattack against an organisation.

Continue reading
  827 Hits
827 Hits

The importance of securing your data - Part 2: Data Loss Prevention tools

The-importance-of-securing-your-data-Part-2-Data-Loss-Prevention-tools

All organisations store data, and regardless of whether it's a recipe or an algorithm, this data is an organisation's most prized asset, which is why hackers make it their target. The Cyber Security Breaches Survey 2019 from the Department for Digital, Culture, Media & Sport (DCMS) found that 32% of businesses identified cyber security breaches or attacks in the last 12 months, which have cost an average of £4,180 in lost data and assets

Continue reading
  868 Hits
868 Hits

The importance of securing your data - Part 1: Privacy and compliance

The-importance-of-data-loss-prevention

Cybercriminals are only getting more cunning and skilful with their cyber attacks, which is bad news for organisations when it comes to meeting privacy and compliance regulations. There can be significant legal implications for organisations if their data is not secure and regulations are not met. For instance, since the GDPR (General Data Protection Regulation) came into effect in May 2018, data protection regulators have imposed 114 million euros (approximately 97 million pound) worth of fines under the GDPR regime (GDPR Data Breach Survey 2020 by DLA Piper).

Continue reading
  721 Hits
721 Hits

The future of CSOC: Threat Intelligence

The-future-of-CSOC-Threat-Intelligence

​ Organisations generate millions of system logs every day from the likes of servers, firewalls and network devices. Their ability to process, analyse and react to this information affects how they will manage any security risks and incidents. To help process this data, many organisations implement a Security Incident and Event Management (SIEM) system or outsource to a Cyber Security Operations Centre (CSOC) for their monitoring, which provides a real-time analysis of security alerts.

Continue reading
  1091 Hits
1091 Hits

© 2020 Exponential-e Ltd. Reg. No. 04499567, Reg. Address:100 Leman Street, London E1 8EU