Most Recent Articles

Just because your workforce is distributed doesn’t mean your office is hybrid-ready. Here are some things about a hybrid office you need to know.

Hybrid working is not going anywhere, but without the right workplace experience, your staff might. Find out how to boost employee satisfaction in our blog.

Microsoft Teams Rooms is a hybrid meetings solution that combines MS Teams, with MS accredited audio and video devices designed to enhance hybrid meetings.

PSTN switch off means some technologies will stop working. Here’s a list of systems that (may) currently rely on PSTN services in your business.

Trying to find out how much bandwidth you need for your internet telephony? This article will help.

Business leaders are worried. Conversations about rising talent shortages are gaining momentum, while the speed of technological advancement is moving faster and faster.

Are you looking to build an effective BYOD policy? These are the essential questions you need to ask.

Cybersecurity jobs are in demand more than ever before – great news for anyone thinking of starting their career in this exciting sector.

The PSTN switch off is on the horizon. Read our blog to find out what will change when it happens and how it will affect your company.

So, the ‘work from home’ rule is officially over, but what happens next? Is ‘flexible working’ fully future proof? It’s the topic that everyone has been talking about in recent months and many...

Curious to see what flexible working practices mean for your IT? Here are three top things you need to watch for.

With IT security threats on the rise, now is the time to take a closer look at the specific dangers your company needs to know about.

As businesses race to keep up with the latest digital transformations, and employees rethink their career paths, the skills gap is widening at an alarming rate.

Can you reduce the cost of pen testing? We answer that questions and more in our blog.

Penetration testing (aka pentesting) is an offensive security exercise using manual and automated (tooling-based) techniques to design and deploy a controlled attack on an organisations assets.

We investigate whether penetration testing can be automated, and discuss how it can complement human-led approaches.

We've come up with three compelling reasons for automated pen testing—but only when it's deployed, handled, and interpreted by experts. Read more in our blog.

A major change to Cyber Essentials is coming and any Cyber Essentials Self-Assessment certifications started after this date will be assessed under the new scheme 'Evendine'.

An easily exploitable, critical impact remote code execution vulnerability has been discovered in a widely used logging package in Java - log4j. Find out more from our Research Lead, Rob Jepson.

Zero Trust works on the basis that you shouldn't trust users outside or inside your network, asking each request to be verified first. Read our blog for more.