28 Jun 2016

Crypto-Locker: What to expect

Posted in Security
Crypto-Locker: What to expect

There are two types of businesses, those that have been a victim of a cyber-attack and those that will be – it’s difficult to escape. It is largely due to cyber-criminals finding new ways to by-pass mail filters, which increases the chance of getting their malicious email in front of you. They’re also getting much […]

23 Jun 2016

A great cloud service needs a great internet connection [guest post]

Posted in SmartCloud
A great cloud service needs a great internet connection [guest post]

Guest post by Brendan Ritchie Following on from Simon’s blog on the cost of moving your firm to the cloud, I am going to cover how recent changes in the telecommunications landscape have impacted the pricing model, while at the same time reducing cloud service downtime. “Cloud” generally means that something is housed in a […]

7 Jun 2016

Developing an IT strategy [Part 3] – make it work with your business objectives

Posted in Strategy
Developing an IT strategy [Part 3] – make it work with your business objectives

In Part 1 of this three part series ‘Developing an IT strategy’ we talked about the benefits of having an IT strategy and why aligning it with your business development plan is an important step. In Part 2 we discussed how to get started and getting it right the first time round. In the final of this […]

Top