Crypto-Locker: What to expect
There are two types of businesses, those that have been a victim of a cyber-attack and those that will be – it’s difficult to escape. It is largely due to cyber-criminals finding new ways to by-pass mail filters, which increases the chance of getting their malicious email in front of you. They’re also getting much […]
A great cloud service needs a great internet connection [guest post]
Guest post by Brendan Ritchie Following on from Simon’s blog on the cost of moving your firm to the cloud, I am going to cover how recent changes in the telecommunications landscape have impacted the pricing model, while at the same time reducing cloud service downtime. “Cloud” generally means that something is housed in a […]
Developing an IT strategy [Part 3] – make it work with your business objectives
In Part 1 of this three part series ‘Developing an IT strategy’ we talked about the benefits of having an IT strategy and why aligning it with your business development plan is an important step. In Part 2 we discussed how to get started and getting it right the first time round. In the final of this […]