Sales: 0845 470 4001 | Support: 0845 230 6001 | Contact Form | NPS
How-the-landscape-for-remote-working-will-never-be-the-same-again
How the landscape for remote working will never be the same again
Exponential-e
Company
Over the last week, school leaders have risen to the challenges of the current crisis.It is a reminder of the responsiveness and resilience of our education system, and for those that are living on another planet (or wish they were at the moment!), the government is closing schools as of today to the vast majority of students. Children of key (critical) workers are still able to attend to ensure medical and transport staff can remain at work, but what does this mean for the other students?
Top-tips-working-from-home
10 top tips for working from home
Exponential-e
Company
Working from home can at times be compared to Marmite - you either love it or hate it. You have people that regularly work from home and find themselves far more efficient and productive doing so, and then you have people that are generally office-based and fear the loss of the structure of the day and the social interaction.  With the majorit...
How-resiliency-is-key-in-the-current-climate-including-our-Education-system-banner
How resiliency is key in the current climate, including our Education system.
Exponential-e
Company
Over the last week, school leaders have risen to the challenges of the current crisis.It is a reminder of the responsiveness and resilience of our education system, and for those that are living on another planet (or wish they were at the moment!), the government is closing schools as of today to the vast majority of students. Children of key (critical) workers are still able to attend to ensure medical and transport staff can remain at work, but what does this mean for the other students?
blog-cover
Coronavirus Lockdown: The Digital Workspace in action
Exponential-e
Company
With the current global situation, the past week has shown the importance of being able to create the Digital Workspace to provide flexible working solutions for your workforce. I decided to write a blog around how Microsoft's Teams, a Unified Communication as a Service (UCaaS) solution, has enabled my productivity to not slip despite the whole of my team now having to work from home thanks to Coronavirus.
b2ap3_large_press-release
Why successful Unified Communications must be addressed from both a technological and cultural perspective
Exponential-e
Company
Twitter, WhatsApp and other means of consumer service technology are becoming part and parcel of communicating at work alongside Unified Communications (UC) technologies. As a result, the boundaries between our work and personal lives are becoming increasingly blurred.
Ransomware-banner
Cyber crime: ransomware attacks
Exponential-e
Company
 Ransomware is malware that encrypts an individual's files so that they no longer have access to them, and subsequently demand payment for the files to be released. Usually the payment is asked to be made in an untraceable cryptocurrency form, such as Bitcoin. The most common way ransomware ends up on an individual's computers is through email...
Phishing-attacks
Phishing: attacks and prevention
Exponential-e
Company
Phishing is the fraudulent use of electronic communications to try and obtain sensitive information, such as usernames, passwords and credit card details by posing as a legitimate institution. Phishing attacks attempt to get individuals to click on a malicious link and enter confidential information to steal their identity, funds or to be the first step in a serious cyberattack against an organisation.
The-importance-of-securing-your-data-Part-2-Data-Loss-Prevention-tools
The importance of securing your data - Part 2: Data Loss Prevention tools
Exponential-e
Company
All organisations store data, and regardless of whether it's a recipe or an algorithm, this data is an organisation's most prized asset, which is why hackers make it their target. The Cyber Security Breaches Survey 2019 from the Department for Digital, Culture, Media & Sport (DCMS) found that 32% of businesses identified cyber security breaches or attacks in the last 12 months, which have cost an average of £4,180 in lost data and assets
The-importance-of-data-loss-prevention
The importance of securing your data - Part 1: Privacy and compliance
Exponential-e
Company
Cybercriminals are only getting more cunning and skilful with their cyber attacks, which is bad news for organisations when it comes to meeting privacy and compliance regulations. There can be significant legal implications for organisations if their data is not secure and regulations are not met. For instance, since the GDPR (General Data Protection Regulation) came into effect in May 2018, data protection regulators have imposed 114 million euros (approximately 97 million pound) worth of fines under the GDPR regime (GDPR Data Breach Survey 2020 by DLA Piper).
AI-and-Big-Data
AI and Big Data
Jonathan Bridges
Company
In 2019, we worked with a customer who owns and operates a mine in Mozambique to help them identify their key business objectives and advise them on how to succeed on these. Throughout our discussions with them, we defined the below key objectives:
How-your-organisation-can-be-more-flexible
How your organisation can be more flexible
Jonathan Bridges
Company
In today's competitive environment, being flexible is a fundamental part of any business strategy to survive. To be flexible, organisations must make the necessary changes needed to respond effectively to the changing market. One simple way organisations can increase their flexibility is by using the innovative technology solutions and services that are available.
The-future-of-CSOC-Threat-Intelligence
The future of CSOC: Threat Intelligence
Exponential-e
Company
Organisations generate millions of system logs every day from the likes of servers, firewalls and network devices. Their ability to process, analyse and react to this information affects how they will manage any security risks and incidents. To help process this data, many organisations implement a Security Incident and Event Management (SIEM) system or outsource to a Cyber Security Operations Centre (CSOC) for their monitoring, which provides a real-time analysis of security alerts.