Articles, written by the team, on what we think about aspects of our industry

Insightful United Response Case Study
Why The Need & How Easy It Was Done
Why United Response needed the solution beyond its existing supplier and how easy the implementation was are covered in this case study. 

The Guide To Email Threats 2018
The Anatomy of an Email Attack
What happens where and when, how will it occur? Is it SPAM, Phishing, Spoofing, or Ransomware? Email is the most likely mechanism for a user to be exploited by malware. 

Monitoring the User and the Network 
User Monitoring, Heuristic Learning and Anomaly Detection
What the user is doing where and when is of vital importance in a modern cyber security strategy. Heuristic learning allows the software to keep ahead of threats and Anomaly Detection spots the unusual.

AV URL & Document Sandboxing vs Ransomware and Malware
AV, URL & Document Filtering
At the Domain level are vital in a modern cyber security solution. Protection against malware is an ongoing task filtering at the Domain level is key
Advanced Web Security - Anomaly Detection, Behavioural Sandboxing vs Ransomware and Malware
Advanced Web Content Filtering includes
Anomaly Detection, Command and Control, Behavioural Sandboxing is just the start of how cloud based web security is now providing essential protection to all organisations. Using behaviour analytics to dynamically isolate threats from the whole network can make the biggest difference in combating all forms of malware or ransomware. 
CCTV So Many Cameras
So Many CCTV Cameras
Why do we have so man? How prevailent is monitoring in our society? what do people do at work? What risks sit beneath the surface at work?
Seven Simple Steps Series
Seven Simple Steps to Mobile Device Management: 
What we think are the how tos, what nots and the why nows, or something like that. Enjoy the read.
Seven Simple Steps to Internal Threat Management: 
It's not just simply about protecting yourself from the outside looking in, but from those already inside that are looking to get out. Insurance is a mitigating precaution. 
Working In Education
Working to Prevent e-bullying
e-Bullying or Cyber Bullying:
Is sadly another aspect of school life. Protecting both pupils and staff is an important aspect to IT services within a school, here is something that will help. 
What we can and already do in Education
Technology Services in Education:
Education is a vital element to life. Increasingly as technology advances and so too must Education's deployment of technical solutions. We have a range of services available. 
Internal Threat Management (ITM)
ITM - Risk Mitigation
Internal Risk Mitigation:    
It's all about RISK, how to mitigate what could happen on the network, how to protect against data leakage, manage productivity and understand who is doing what, where and when.