by Alan Bullen | Feb 9, 2023 | Article
How can I protect against insider cyber security threats? Insider cyber security threats refer to actions taken by employees, contractors, or business partners who have legitimate access to an organization’s systems and data but use that access to cause harm....
by Alan Bullen | Feb 9, 2023 | Article
What’s the difference between vulnerability testing and penetration testing? Vulnerability testing and penetration testing are both methods used to assess the security of an organization’s systems and infrastructure, but there are some differences between...
by Alan Bullen | Nov 24, 2022 | Article
Why we’re moving our servers to the cloud On 9th November 2022, part of Milton Keynes was hit with a power cut. It took out our power for about 35 minutes, but our UPS kicked in and gave us enough time to down our servers. I have to confess here that, had we followed...
by Alan Bullen | Sep 20, 2022 | Article
7 QUESTIONS TO ASSESS YOUR UPS’S ABILTY TO HANDLE A POWER CUT Is your UPS man enough for the job? Can it provide enough energy to down your servers in a managed fashion? It may have been suitable when your system was designed but have you added equipment that would...
by Alan Bullen | Sep 7, 2022 | Article
What is WiFi 6E? What is WiFi 6E? WiFi 6E is the latest and best WiFi standard. It uses an extended frequency range which enables faster speeds (up to 10.8Gbps), lower latency and up to four times as many devices to be connected without network congestion. It...