Sales: 0845 470 4001 | Support: 0845 230 6001 | Contact Form | NPS

Solving the Culture Conundrum in Software Engineering

Dev Ops Consultant at Exponential-e, Alistair Doran, write for 'Tech Native', discussing Software engineering and the cultural changes needed to move ...

Continue reading
  486 Hits

Danger, bots at work: the risk of botnets for businesses

Paulo Henriques, Head of Cyber Security Operations at Exponential-e, writes for 'Global Banking and Finance', discussing the cyber security steps busi...

Continue reading
  524 Hits

What is the modern day CISO prioritising as cyber-risks continue to surge?

Chief Innovation office at Exponential-e, Jonathan Bridges, speaks to 'Intelligent Ciso' about the importance of having a robust cyber security plan i...

Continue reading
  461 Hits

Data Privacy Week: Cyber and data privacy experts share their views.

Tom Richardson, Cloud Sales Specialist for Media at Exponential-e, speaks to Technology Dispatch about the importance of protecting sensitive data by ...

Continue reading
  544 Hits

Science for the everyman

Head of Public Sector at Exponential-e, David Lozdan, speaks to City AM about the investments in data-driven digital healthcare and how this is effect...

Continue reading
  426 Hits

International Women’s Day – How can we encourage and retain women in tech?

Amy Springford, Director of Client Relations at Exponential-e, speaks to SheCanCode, discussing the importance of inclusivity in the workplace and how...

Continue reading
  400 Hits

How four technology uses could transform the public sector

Afshin Attari, Director of Public Sector and Unified Platforms, writes for 'Government Transformation Magazine' discussing the four core technologies ...

Continue reading
  288 Hits

Defending Your Organization Against Ransomware

Our Chief Innovation Officer, Jonathan Bridges, writes for 'Security Boulevard' about the importance of understanding and preparing for ransomware att...

Continue reading
  288 Hits

What does the ICO’s new fining guidance mean for your organisation?

What-does-the-ICOs-new-fining-guidance-mean-for-your-organisation

On the 18th March 2024, the Information Commissioner's Office issued its updated guidance around the issuing of fines when organisations have been found liable for the integrity of their customers' or end users' data being compromised. It is already well-established now that failure to ensure critical data remains secure will result in costly fines, as we have seen repeatedly in multiple high-profile cases over the years.

Continue reading
  471 Hits

Ransomware: lessons all companies can learn from the British Library attack

Ransomware-lessons-all-companies-can-learn-from_Blog-Banne_20240322-175134_1

In October 2023, the British Library suffered "one of the worst cyber incidents in British history," as described by Ciaran Martin, ex-CEO of the National Cyber Security Centre (NCSC). 

The notorious Rhysida ransomware gang broke into one of the world's greatest research libraries, encrypting or destroying much of its data, and exfiltrating 600 GB of files, including personal information of British Library staff and users.

Continue reading
  76386 Hits

The Key to Establishing Ironclad Remediation and Disaster Recovery Processes

The-Key-to-Establishing-Ironclad-Remediation-and-Disaster-Recovery-Processes_Heade_20240322-102320_1

To Test or Not to Test?When it comes to IT disaster recovery and remediation processes, regular testing is not a 'nice to have' - it's absolutely essential!

This isn't hyperbole on my part. You just have to look at the news on any given day. We've all heard the horror stories of organisations in both the public and private sectors experiencing prolonged downtime during disasters due to inadequate preparation, lack of testing, and the unsuitability of their legacy remediation processes and systems.

Continue reading
  423 Hits

What makes a ransomware attack eight times as costly? Compromised backups

blog-header-what-makes-a-ransomware-attack-eight-times-as-costly

Any organisation that has tried to recover from a ransomware attack knows that it can be time-consuming and costly. Companies hit by an attack must choose between paying a ransom or recovering encrypted data from a backup.

Unfortunately, ransomware gangs are too aware that they can leverage significantly higher ransoms from their corporate victims if they have also compromise the company's backups. For this reason, we are seeing more and more cyber attacks targeting backups because they know that organisations desperately need them to recover if they want to avoid paying a ransom to cybercriminals.

Continue reading
  96910 Hits

3.5 million Omni Hotel guest details held to ransom by Daixin Team

3.5-million-Omni-Hotel-guest-details-held-to-ransom-by-Daixin-Team_Blog-Header

The international hotel chain Omni Hotels & Resorts has confirmed that a cyberattack last month saw it shut down its systems, with hackers stealing personal information about its customers.

In the aftermath of the attack, hotel guests reported that they had been forced to check in on paper, that room keys didn't work, and all phone systems and Wi-Fi were offline.

Continue reading
  50673 Hits

Offering clients the ultimate peace of mind – a new approach to security and remediation for legal firms

blog-header-legal-remediation-offering-clients-the-ultimate-peace-of-mind

Although the sector as a whole has traditionally been comparatively wary of the ever-increasing pace of technology, legal services are increasingly data driven, with an abundance of AI-related discussion emerging within legal technology circles. The core Document Management Systems (DMS) and Practice Management Systems (PMS) remain the centre of focus for how and where to deploy a variety of rapidly maturing SaaS platforms, or dedicated, highly customised suites.

Continue reading
  75 Hits

Don’t go Soft: The Case for Teams Direct Routing

Dont-go-Soft-The-Case-for-Teams-Direct-Routing

Now more than ever, effective collaboration and communication are the keys to success. Throughout 2020, we saw a widespread shift in how we interact with each other, both in and out of work, and how we stay connected to our colleagues and customers. Just consider the following:

Continue reading
  2020 Hits

The 12-18-3 method - opening the door to accelerated innovation and continuous learning

The-12-18-3-method---opening-the-door-to-accelerated-innovation-and-continuous-learning

The digital landscape is evolving at a rate that's never been seen before and is set to continue accelerating in the years ahead. In such a fast-paced environment, the ability to work flexibly, responding to unexpected challenges and optimising the time-to-market for new innovations, is critically important for all organisations - whether they're ambitious start-ups or established global leaders. While IT infrastructure must certainly support this - hence the widespread phasing out of legacy infrastructure in favour of increasingly sophisticated Cloud transformation strategies - any new technology will be of limited effectiveness if processes and methodologies do not evolve in parallel.

Continue reading
  1566 Hits

The true meaning of digital transformation (it’s more than just reorganisation and technology)

blog-header-the-true-meaning-of-digital-transformation

After several years of serious global upheaval, it is clear that resilience, agility, and the ability to adapt to the unexpected are critical priorities for all organisations – regardless of size or sector. However, this accelerated pace of change has, in many cases, revealed the limitations of existing IT services. With an increasing emphasis on on-demand services and a highly fluid workforce, legacy services and their systems often struggle to support new propositions and customers' evolving needs, which will – in turn – make maintaining a competitive advantage difficult, if not near impossible.

Continue reading
  1783 Hits

Understanding the Five Time Thieves and Retaking Control of Your Most Precious Resource

blog-header-Understanding-the-Five-Time-Thieves_

We're all trying to do more with less, whether that's making our monthly shop go further and reducing our utilities consumption at home or doing more with our organisations' available budgets and resources in our professional lives. But while getting the most out of the resources we have available is certainly admirable and sensible, our most precious resource – one that we cannot replenish once it's been used – is all-too-frequently neglected: our time.

Continue reading
  2064 Hits

Developing a new breed of security to suit the new ways in which we consume content

Developing-a-new-breed-of-security-to-suit-the-new-ways-in-which-we-consume-content
The way in which we consume content has changed forever. Physical media and prescheduled TV and radio have rapidly given way to the convenience, accessibility, and range offered by streaming services. Independent content creators share the digital stage with the most well-established industry leaders, and numerous organisations have embraced the mantra that 'content is king', utilising online video as a key tool for building engagement with their prospects and customers.
Continue reading
  1873 Hits

Preparing for the 2025 PSTN switch-off

preparing-for-the-2025-pstn-switchoff

Now more than ever, organisations across the public and private sectors depend on seamless, secure, and high-quality communications. Even with an increasing range of channels having established themselves in recent years - including voice, email, video, and SMS - voice services remain a key part of how we communicate and collaborate.

Continue reading
  1050 Hits