Guides
2025 Guide to Good Cyber Security
What's in the guide?
- How to spot risks
- 12 actionable steps to stay secure
- What to do after an attack
- Expert advice from cyber security pros
The CrowdStrike Outage Explained
A Guide to Cyber Essentials Certification
An overview of cyber insurance
10 Essential security practices for remote work
Back up your data - One day it could save your business
All businesses should adopt MFA. Now
Getting to grips with email security
Your guide to cloud security
The business owner's complete guide to phishing
How to protect your business's data when working from home
Working from home is huge and here for good. That means we now not only have to think about security in our office, but also our staff's homes. Our new guide provides 5 recommendations to help keep our business's data safe.
Defend and Invest
Our guide, Defend and Invest looks at:
- Defending your business from cyber-crime, which is on the rise and only going to increase this year.
- Investing in technology that doesn't stop your business reaching it's goals, but helps you keep moving towards them.
Blog posts
Smart IT Budgeting for Care Providers: A Finance Director's Guide to Predictable Technology Costs
Predictable IT costs are essential when working within the tight margins of the care sector. This challenge is particularly acute in care settings where technology directly impacts resident safety and regulatory compliance. In this article we discuss how to transform IT from an unpredictable cost into a predictable business enabler that supports both financial planning and care excellence.
How to Take Control of Your Cloud Costs
The cloud can be a powerful tool for growing businesses, but it can also lead to some nasty surprises when the bill arrives. We show you how, with the right approach and support, you can take control of your cloud spending and make every pound count.
MFA Isn’t Bulletproof: How to Protect Your Microsoft 365 Data from Session Hijacking
A growing threat called session hijacking is bypassing MFA entirely, and it's already being used to target Microsoft 365, Microsoft personal accounts and Google accounts like yours. Here's what you need to know.