Guides
2025 Guide to Good Cyber Security
What's in the guide?
- How to spot risks
- 12 actionable steps to stay secure
- What to do after an attack
- Expert advice from cyber security pros
5 Steps to Improve Your Ransomware Resilience
we answer questions such as: What is ransomware? Is my business really at risk? And why is it so hard to undo?
Blog posts
Smart IT Budgeting for Care Providers: A Finance Director's Guide to Predictable Technology Costs
Predictable IT costs are essential when working within the tight margins of the care sector. This challenge is particularly acute in care settings where technology directly impacts resident safety and regulatory compliance. In this article we discuss how to transform IT from an unpredictable cost into a predictable business enabler that supports both financial planning and care excellence.
How to Take Control of Your Cloud Costs
The cloud can be a powerful tool for growing businesses, but it can also lead to some nasty surprises when the bill arrives. We show you how, with the right approach and support, you can take control of your cloud spending and make every pound count.
MFA Isn’t Bulletproof: How to Protect Your Microsoft 365 Data from Session Hijacking
A growing threat called session hijacking is bypassing MFA entirely, and it's already being used to target Microsoft 365, Microsoft personal accounts and Google accounts like yours. Here's what you need to know.