Blog

25 May:
What is a VoIP System?

Voice over the Internet Protocol (VoIP) refers to a type of technology which makes it possible for users to make calls using a broadband Internet connection rather than through the conventional method of a landline phone system. Many large sized companies have caught on to the rising popularity of the VoIP system in recent years. […]

Read More

18 May:
The Human Factor Behind Compromised Passwords

This article was originally posted on www.renaissance.ie. A lot has been written on passwords and their role in keeping our networks and data safe and secure, with malware infections spreading more rapidly than ever (it is estimated that 1 in 4 people will fall victim to a data breach by 2020 – “Naked Security”) In […]

Read More

11 May:
GDPR – What does it mean for the SME?

The General Data Protection Regulation (GDPR) which comes into effect in May 2018 will have an impact on the way in which businesses process and store the personal data of EU citizens. Many businesses, especially SME organisations are concerned as to how exactly this new regulation will affect their business. As was mentioned previously, this […]

Read More

4 May:
The Impact of Converged Infrastructure on Backup and Disaster Recovery

This article was originally posted on www.storagecraft.com by Contel Bradford on March 28th. The modern day infrastructure is a complex machine with numerous interconnected components. There are so many moving parts that there’s always a risk something will go wrong. And when it does, downtime is inevitable. Converged infrastructure can play important tole in resiliency […]

Read More

27 April:
How Often Should You Reassess Your Disaster Recovery Plan?

Implementing a disaster recovery plan as part of a business continuity process (BCP) is an essential requirement for all businesses. In a complex technological landscape, having reliable backup and recovery solutions in place is beneficial for ensuring your IT efforts and data are protected. However, having disaster recovery solutions in place are of zero value […]

Read More

20 April:
Five Areas for Cybersecurity Innovation in 2017

This article was originally posted on blog.fortinet.com by Michael Xie on February 27th, 2017. The world never stands still. In the technology space, this means that constant innovation and discovery is the key to a solution provider’s survival and growth. In the cybersecurity arena, this creed is even more vital. Many hackers are brilliant people. […]

Read More

13 April:
Cyber Essentials – What’s in it for me?

Cyber Essentials (CE) refers to a cyber security certification scheme backed by the UK government and industry supported. This scheme was launched in April 2014 to assist organisations in protecting themselves from common cyber-attacks and has quickly become an invaluable health check baseline and roadmap for businesses wishing to improve their cyber security.   What […]

Read More

5 April:
Common Cloud Mistakes – And How to Avoid Them

This article was originally posted on cloudtweaks.com by Brian Wheeler on November 28th, 2016. One of the first lessons in order to avoid common cloud mistakes with anyone entering the tech field learns is that nothing is as simple as it appears to be at first glance. That lesson goes double for companies implementing a […]

Read More

29 March:
How to keep your identity safe while moving to the cloud

Cloud computing has become part of the IT strategy used by both companies and individuals in recent years for storing data. However, with any new development in IT and computing, the question surrounding security is raised. Spector knows how important it is for companies and individuals to ensure that their identity and data are kept […]

Read More

15 March:
GDPR – What is it?

The General Data Protection Regulation (GDPR) is a new regulatory legislation which will come into force across all EU member states on May 25th, 2018. It aims to bring data protection legislation into line to reflect the new and unforeseen ways in which data is now being used. The legislation focuses on giving individuals more […]

Read More

21 September:
5 Advantages of Managed IT Services for SME’s

In today’s fast moving business world, your organisation depends on solid technology to help you squeeze the most out of your available resources. Good technology solutions allows businesses to scale up smoothly and effortlessly. However, a business can find itself in a catch 22 situation when they need to upgrade its infrastructure but don’t necessarily […]

Read More

14 September:
My Identity has been hacked by Cyber Criminals

It could not happen to me, you or anyone else I know! This is the age old problem and one borne of ignorance. In the past 30 days we have been contacted either directly or through friends by three individuals and 2 companies with detailed cyber security incidents. These are only the ones that we […]

Read More

7 September:
How to Prevent Company Data Breaches

When it comes to company protection data breaches can be devastating event. And data breeches are more common that most businesses like to think they are. If you think about it data breeches can often make the headlines of the news. The impact to a company from a data breech can be such that many […]

Read More

31 August:
Information Security Companies: What Can They Do for Your Business?

Many business owners and directors are unaware of the tremendous benefits that an information security companies can bring to their organisation. Even fairly small firms could find that engaging the services of an IT security company will add tremendous value both to their overall security posture and also to their specific computer risk profile. Information […]

Read More

24 August:
IT Managed Services: What Does the CIO or IT Director Need?

The need clearly, is to find a strategic partner, who can drive business growth and transformation, rather than remain a mere supplier of IT capacity. More and more organisations want more than just in there approach. They are looking for a highly flexible, broadly capable partner who take a more proactive approach to IT management, […]

Read More

17 August:
Top Tips When Choosing an IT Service Provider

When looking at how best to manage a companies IT needs, more and more firms make the decision to use an outsourced IT service provider. This is a big change from a decade ago, when typically companies tended to outsource if in-house resources became stretched. The delegation of network functions to a managed service provider […]

Read More

2 August:
Disconnected thinking and business systems – NOT GOOD

Disconnected Thinking – Does it have to be this way? There is a modern epidemic.. In fact perhaps not modern at all, perhaps just typical and more connected to the way that we now operate. Immediacy out trumps planning, busyness out trumps logic and sequence. The time trap. We are all prone to rash on […]

Read More

15 June:
Cyber Security = Platform & Policy

Cyber Security and Protecting Your Business We attended an interesting and useful Cyber Security seminar hosted by our local ISP Magnet, PwC and Palo Alto yesterday. A lot of good topics and good advice was dispatched but the piece that resonated most with us was the topic of Education. Pat Moran, Head of Cybercrime & […]

Read More

3 June:
Spector Ascend – Simple, Effective & Powerful

Spector Ascend – What is Involved? There are a lot of components to business technology but it is way simpler when viewed through a lens that prioritizes goals and actions as they need to be addressed. The Spector Ascend programme provides two clear goals. First to set out best practices and KPI’s and make sure […]

Read More

2 June:
Is this the future of Security?

Is this the future of Security as we know it? You might not need to remember those complicated e-mail and bank account passwords for much longer. According to a new study by Binghamton University researchers, the way your brain responds to certain words could be used to replace passwords. Could this be the future of […]

Read More

26 April:
8 Things you can do to Protect Yourself from Cyber Security Threats

Since none of us are immune to cyber security threats now is a good time to take a look at your own online security strategy to see that it is up to date and effective. Protect yourself from social engineering and phishing attacks. Use your judgement and do not open suspicious email even if you […]

Read More

12 April:
5 Simple Steps to Help Keep your Data Secure

Data is vital in any business so it is critical to keep your data secure from all external and internal risks. Due to the increased mobility of workforces many employees regularly access company data from multiple devices both corporate and personal. You need to ensure your business is not at risk in the event of […]

Read More

29 March:
Does my SME need Disaster Recovery?

There is a lot of talk about Backup and Disaster Recovery and they are critical elements for any business to have in place but we find that not all SME’s understand the differences between them. Furthermore many are not aware whether their chosen solution is tested and effective in addressing their recovery needs until it […]

Read More

15 March:
5 Benefits of moving to VoIP

VoIP or Voice over Internet Protocol is simply a system that lets people make telephone calls through the internet rather than via a traditional analog phone system. VoIP converts the voice signal from an ordinary telephone into a digital signal, which travels over the internet, and then converts it back. With a VoIP service customers […]

Read More

1 March:
7 Questions You Should Ask When Choosing a Managed IT Service Provider

For months, your company has tried to overcome its technology challenges, but it’s becoming obvious that your current IT providers cannot fix the problems. As the manager with overall responsibility for IT, you’re stuck in the middle between employees with tech problems and your IT provider whether in house or an outsourced contractor. You know […]

Read More

23 February:
5 Signs Your Company Needs a Managed IT Service Provider

As a CEO or business owner, you know you cannot manage everything yourself. To ensure your company’s success, and offer the best possible environment for your employees, you have to delegate. Your IT needs are no different. Here are a few signs that indicate it’s time to seek out a better solution. If you’re experiencing […]

Read More

16 February:
Does Outsourcing technology support really work?

Each time that we sit in front of a potential, client they are weighing up the benefits of outsourcing their IT management versus managing their own with an internal resource. The question is not a simple one to answer but we have a number of key observations from working with clients that suggests that outsourcing […]

Read More