-
More about your VPN
This is a follow-on article to my previous article Let’s Talk About Your VPN. You should read that article first, to save me having to explain what a VPN is and why I am talking about them now. VPN Issues I spent last week talking up the cyber security advantages of your VPN, but all…
-
Defence in Depth Part 3
Welcome back once again for part 3 of Defence in Depth. The final layer of protection is the full endpoint (Local PC) backup. You can have all the protection in the world for your cloud environment however lots of important business critical data can and often is stored locally, however what happens when your computer…
-
Let’s Talk About Your VPN
I am on holiday for the next two weeks – some cold weather walking in the Lake District and the Cairngorms, whilst Diana stays back in the warm office – so it must be time to discuss VPN usage again. The photo above is the view whilst I write this article. A VPN – your…
-
Defence in Depth Part 2
Welcome back! If you haven’t read part 1 about “Defence in Depth” please check it out, otherwise let’s look at the next stage of defence in the cyber security theatre of war. Remote Monitoring and Management (RMM) RMM is a toolbox of programs, a swiss army package, taking care of lots of tasks which historically…
-
Defence in Depth Part 1
“Defence in depth is a strategy that leverages multiple security measures to protect an organisation’s assets. The thinking is that if one line of defence is compromised, additional layers exist as a backup to ensure that threats are stopped along the way” SaaS Defence in Depth Microsoft 365 is used by millions and is an…
-
Here is Your Next Cyber Security Step
Are you still unclear about the benefits our clients get from our cyber security stack and Security Operations Centre? Are you not sure that you want to take the next step in better cyber security? Cyber Security Webinar John O’Mahony, one of the keynote speakers from the recent Connect London 2023 conference, will present a…
-
We do cover Christmas and New Year IT and cyber security calls
Although we all have time off over Christmas and the New Year – the nature of the work we carry out for clients means that we never really stop. Computers and IT infrastructure can have issues any time and cyber security incidents are unpredictable. We have emailed all our clients telling them about our Christmas…
-
What does our SOC do?
It is easy for us to say, “You need our Security Operations Centre (SOC)” but then we are often asked, “What will that do for us?”. Here is a real-life example showing how the SOC keeps a constant watch for unusual activity in your systems. Remembering that unusual activity could mean a threat or attack.…
-
Windows Pro – Do you need it?
For a very long time nearly all Windows computers were sold in one of two flavours, Windows Home and Windows Pro. There have been variations but those two are the most widespread. The use cases are obvious, but that’s not to say you cannot use either for both. If your business I.T. needs are very…
-
A Geek Present for Christmas 2023
We’re back. It is that time of year again when some of you out there in internet land need a gift for a geek partner, spouse, siblings, friend, relation, boss, etc., etc., etc. – I am here to help. Here is my personal selection, various prices, all geeky. There may be that ideal gift on…
-
The IBM Personal Portable Computer
Jeremy and I were going through some old equipment yesterday at a client who is moving offices and we found the IBM Personal Portable Computer from 1984. This isn’t something you see everyday. It has brought back powerful memories to Diana, who was in the first batch of six employees at Ford of Europe to…
-
Back to Basics – Passwords and Ordinary People
I can hear you groan from here – “Why does he want to talk about passwords again? We know about passwords…”. Why am I talking about Passwords? I was talking with friends last week – not clients – and I was asked what exactly I do at Octagon Technology. Diana takes care of the statutory…