Cyber weakest link?

Don’t let your weakest link bring your business down, writes Paul Barber, an infrastructure manager from managed service provider IT Specialists.

We’ve all heard the saying “A chain is only as strong as its weakest link”. When it comes to your organisation’s cyber resilience, the figurative chain is built with a blend of IT infrastructure and employee practices. A balance between the two is critical. You might have a seemingly impenetrable network perimeter, but if a hapless employee downloads a malicious file onto their computer from a phishing email, you have a weak link.

Read More →

Why you need a strong password policy

Earlier this summer, dozens of parliamentarians’ email accounts were targeted by an alleged state-sponsored cyber attack. Officials were forced to lock the affected users out of their own accounts to avoid potential blackmail attempts. The accounts targeted had something in common: they had weak passwords that did not meet Parliamentary Digital Service guidelines.

Read More →

Future-proof technology is a myth: can your tech keep up?

It’s true: there is no such thing as future-proof IT. As Deloitte pointed out in its “Technology Industry Outlook 2017”, technology is changing at warp speed, opening up countless opportunities in the business world. On the flip side, technological change brings new challenges as businesses struggle to keep their systems up to date. How can you get the most value from your IT investment without getting left behind? Here are our top tips.

Read More →