Blog

CorridorDigital security hack

Corridor Digital, A Story of skirting over cyber security

First of all I want to start by saying I love to watch CorridorCrew…

Email Security Gateway – What is it and why should you have one in place?

I recently wrote a blog post about how to spot a phishing attack…
Cyber Essentials

Cyber Essentials, What’s new 2022?

Cyber Essentials is an effective, government-backed and industry-supported…
What is Phishing?

What is Phishing?

A phishing attack is sending emails that appear to be from trusted…
Ransomware in the real world

WEBINAR RECAP: Ransomware in the real world. Is your IT Department ready to be attacked?

Last week, we hosted a Webinar to ask businesses if their IT…
windows defender

Please don’t tell me it’s Window’s Defender!

Cyber-attacks happen and are increasing in frequency. Certain…
Education OPEX Budget

Why the move to an OPEX budget model in education might be driving your business manager up the wall

For the longest time IT in education has been on a hamster wheel…
technology trends

The tech that should shape your business in 2022

All the way back in January 2021, I wrote an article about what…
Log4J cyber security

Log4J Zero-Day Flaw – Are you are risk? And How Do you Protect Yourself?

The Log4j vulnerability is effecting everything from development…
2021 Best and Worst Technology

2021 – The Big Technology Winners & Losers

Just over a year ago, I sat down to write a technology review…
endpoint security

Why Endpoint Protection is still a key line of defence

You won't believe this. I tell a lot of business owners and IT…
Windows 11 is here

Windows 11 is here. It’s glorious but hold your horses!

Windows 11 has arrived with a fresh new look, increased speed…

Looking for a technology partner?
Let’s talk

  • This field is for validation purposes and should be left unchanged.