The latest news from claireLOGIC

Informative content on the latest trends, best practice
and things to watch out for…

The Cyber Risks of Home Working

The Cyber Risks of Home Working

As I’m sure everyone knows, home working has become more popular than ever before. And don’t get us wrong, this is great! It allows for more flexibility, saves time and money, boosts job satisfaction, work-life balance…the list goes on… That being said, in order to fully utilize these benefits and keep your business and employees safe, it’s important to understand the risks, specifically cyber risks, associated with home working:

16th September 2022

Can you, and should you monitor staff activity when home working?

Can you, and should you monitor staff activity when home working?

This is quite a controversial subject with many mixed views, but given that 46% of workers in the UK currently work from home (either permanently or on a hybrid basis), it’s definitely something a lot of businesses are considering.

8th September 2022

Cyber Security – layer two: Perimeter Security

Cyber Security – layer two: Perimeter Security

The second layer of defence is perimeter security. This layer includes technologies such as Next Generation Firewalls, Security Information and Event Monitoring and vulnerability management. Defence in Depth (DiD) is a cybersecurity strategy that uses multiple layers of security to protect a business’s critical assets and IT systems. Moving to this layered approach is effective as it secures all attack surfaces, and even if a malicious actor gets through one layer of defence with a novel attack method, they are likely to be stopped by a further layer of defence.

8th July 2022

What is an IT strategic review?

What is an IT strategic review?

An IT Strategic Review offers a "line in the sand" moment - a snapshot of where the business is right now. And as it's run externally, it's also impartial. Why do I need an IT Strategic Review? Businesses that don’t invest in IT are missing out on efficiencies and are most at risk of cybercrime.

6th July 2022

Why you need to turn MFA on

Why you need to turn MFA on

MFA is a tool used to add an extra layer of security for your accounts and data. MFA makes sure your accounts can’t be fraudulently accessed. To protect your business and personal data, along with your password, MFA utilises additional methods of identity verification that only YOU will have access to at the time of log-on. This essentially makes sure it’s really you signing in!

5th July 2022

Cyber Security – layer one: Email and Web Security

Cyber Security – layer one: Email and Web Security

The first layer of defence is email and web security. This layer is extremely important with 90% of IT professionals stating phishing emails as their number one concern. Thankfully, if a business has a comprehensive email and web security solution, they significantly decrease their chance of having their data breached.

30th June 2022

Ineffective and effective IT policies

Ineffective and effective IT policies

In order to ensure that IT policies are effective, there should be a clear understanding of the governance process. This includes responsibilities, accountability and hierarchy. Organisations need to have a clear understanding of who is responsible for what and who has the authority to make decisions – and make the right ones. Ineffective IT policies can lead to a number of problems. They can result in a loss of productivity, a decrease in employee morale and even worse...

28th May 2022

The Pros and Cons of BYOD Policies

The Pros and Cons of BYOD Policies

The use of BYOD policies has increased exponentially in recent years (especially during the pandemic – with the ‘mad rush’ to just keep working). Bring your own device IT policies (often referred to as BYOD policies) are often seen as a way to save money and increase productivity. However, there are both good and bad aspects to this policy.

25th May 2022

The 5 Steps to Create a Comprehensive Security Ecosystem

The 5 Steps to Create a Comprehensive Security Ecosystem

Why your business needs a security ecosystem? A security ecosystem is a group of technologies that work together on a platform to provide an outcome that utilises all the technology components effectively. Having an integrated and reactive system in place that works with different components to detect, react to and contain any security incidents and works to recover your network on a single security platform – with integrated ecosystems, will help your business...

20th May 2022

Technologies to power the modern workplace

Technologies to power the modern workplace

Trends show this flexible working approach is likely to continue, if not increase in popularity going forward. This is because more and more businesses are realising the majority of their operations can still be carried out comfortably whilst working from home. This is not to mention the increased expectation from employees themselves to have the option to work from home.

18th May 2022

Connect with us on social media for the latest news, trends and tech event offers