Latest from the Blog

News and best practice for cloud and cyber security

June 14, 2019
Robotic jobs automation

Process Automation – is your business ready?

It’s no surprise that we’ve become dependent on Robotic Process Automation RPA) to do our business on a daily basis. Automation is happening across many industries. […]
June 6, 2019

System Administrators Standing on the Shoulders of Giants

From World War 2 WRENS to Modern day cloud admins, automation has always been part of the process. Automating and speeding up, boring, long and repetitive […]
June 4, 2019
Cloud Security

Auditing your Public Cloud – AWS

You’ve got your platform launched, you’ve had your pen tests done and everything is ticking over nicely but how do you know what’s going on within […]
June 4, 2019

Have you implemented data classification yet?

There’s one thing that we are not running out of today in today’s world and that’s data. According to an Economist article published in 2017, data […]
May 30, 2019
Digital Footprint

Your Digital Identity & Footprints

There is a computing concept called Twinning. It’s the idea that a real-world version of something exists but also a digital ‘twin’ – a digital copy […]
May 21, 2019

What’s your policy on policies?

The importance of setting a Policy for your Security Policies In our role as cybersecurity specialists managing multiple cloud ecosystems and hosting complex websites, we’ve learnt […]
May 14, 2019

Psychology of Social Engineering Attacks

It never ceases to amaze how fraudsters get away with scams, with the media reporting on victims who have fallen to the many smooth-talking fraudsters peddling […]
May 1, 2019

Cutting Through Cloud Complexity – Cutting Costs

Learn how to be a Cloud Ninja – and save 30% to 40% on your cloud costs In this blog post we look at ways to […]
April 30, 2019

Identity & Access Management is the foundation for best practice IT Architecture

What is IAM? Identity and access management (IAM) is a cornerstone of modern IT architecture and comprises of essential security features and protocols; which businesses should […]