Claranet | Blog

The latest blogs from Claranet.

  • What is penetration testing?

    What is penetration testing?

    Penetration testing (aka pentesting) is an offensive security exercise using manual and automated (tooling-based) techniques to design and deploy a controlled attack on an organisations assets.

    Read Article
  • Hybrid office: everything else you need to know

    Hybrid office: everything else you need to know

    Just because your workforce is distributed doesn’t mean your office is hybrid-ready. Here are some things about a hybrid office you need to know.

    Read Article
  • How to reimagine your workplace experience and guarantee employee satisfaction

    How to reimagine your workplace experience and guarantee employee satisfaction

    Hybrid working is not going anywhere, but without the right workplace experience, your staff might. Find out how to boost employee satisfaction in our blog.

    Read Article
  • Go there now
  • Kickstarting hybrid meetings with Microsoft Teams Rooms

    Kickstarting hybrid meetings with Microsoft Teams Rooms

    Microsoft Teams Rooms is a hybrid meetings solution that combines MS Teams, with MS accredited audio and video devices designed to enhance hybrid meetings.

    Read Article
  • Eight things that will stop working after PSTN switch off

    Eight things that will stop working after PSTN switch off

    PSTN switch off means some technologies will stop working. Here’s a list of systems that (may) currently rely on PSTN services in your business.

    Read Article
  • ×

    First Name
    Last Name
    Thank you!
    Error - something went wrong!
  •  How much bandwidth do we need for IP telephony and remote working?

    How much bandwidth do we need for IP telephony and remote working?

    Trying to find out how much bandwidth you need for your internet telephony? This article will help.

    Read Article
  • Why diversity and inclusion is essential in tech

    Why diversity and inclusion is essential in tech

    Business leaders are worried. Conversations about rising talent shortages are gaining momentum, while the speed of technological advancement is moving faster and faster.

    Read Article
  • Five questions to ask before creating a BYOD policy

    Five questions to ask before creating a BYOD policy

    Are you looking to build an effective BYOD policy? These are the essential questions you need to ask.

    Read Article
  • How to start your career in cybersecurity

    How to start your career in cybersecurity

    Cybersecurity jobs are in demand more than ever before – great news for anyone thinking of starting their career in this exciting sector.

    Read Article
  • Learn more
  • What is 'PSTN Switch off' and what does it mean for me?

    What is 'PSTN Switch off' and what does it mean for me?

    The PSTN switch off is on the horizon. Read our blog to find out what will change when it happens and how it will affect your company.

    Read Article
  • The work from home rule is over... what next?

    The work from home rule is over... what next?

    So, the ‘work from home’ rule is officially over, but what happens next? Is ‘flexible working’ fully future proof? It’s the topic that everyone has been talking about in recent months and many...

    Read Article
  • Application Security For Developers: Learning Defence by Offense

    Application Security For Developers: Learning Defence by Offense

    Abhijay, part of Claranet Cyber Security, discusses why web application vulnerabilities are on the rise and also why it’s essential that developers are educated in response to the growing risks.

    Read Article
  • What do flexible working practices mean for your network infrastructure?

    What do flexible working practices mean for your network infrastructure?

    Curious to see what flexible working practices mean for your IT? Here are three top things you need to watch for.

    Read Article
  • 5 emerging modern workplace network security threats and risks to avoid in 2022

    5 emerging modern workplace network security threats and risks to avoid in 2022

    With IT security threats on the rise, now is the time to take a closer look at the specific dangers your company needs to know about.

    Read Article
  • The simple truth behind the tech skills shortage

    The simple truth behind the tech skills shortage

    As businesses race to keep up with the latest digital transformations, and employees rethink their career paths, the skills gap is widening at an alarming rate.

    Read Article
  • Can You Cut the Cost of Penetration Testing to Match Your Budget?

    Can You Cut the Cost of Penetration Testing to Match Your Budget?

    Can you reduce the cost of pen testing? We answer that questions and more in our blog.

    Read Article
  • 3 Compelling Reasons Why You Need Automated Penetration Testing

    3 Compelling Reasons Why You Need Automated Penetration Testing

    We've come up with three compelling reasons for automated pen testing—but only when it's deployed, handled, and interpreted by experts. Read more in our blog.

    Read Article
  • Cyber Essentials Update (Evendine)

    Cyber Essentials Update (Evendine)

    A major change to Cyber Essentials is coming and any Cyber Essentials Self-Assessment certifications started after this date will be assessed under the new scheme 'Evendine'.

    Read Article
  • Blog | Detecting Log4Shell Vulnerabilities

    Blog | Detecting Log4Shell Vulnerabilities

    An easily exploitable, critical impact remote code execution vulnerability has been discovered in a widely used logging package in Java - log4j. Find out more from our Research Lead, Rob Jepson.

    Read Article
  • What is Zero Trust and why should you care?

    What is Zero Trust and why should you care?

    Zero Trust works on the basis that you shouldn't trust users outside or inside your network, asking each request to be verified first. Read our blog for more.

    Read Article
  • loading
    Loading More...