Cyber Insurance. Are you covered?

Cyber Insurance. Are you covered? In a recent post by Shaun Freeman here, the author references the critical elements required to protect your business from Ransomware using a very useful checklist.…
Read Post

Do you use a DrayTek router?

Do you use a DrayTek router? Do you think it is protecting your perimeter as much as you need it to?  In the last few days’, I have come across…
Read Post

Going in for the Kill (chain)!

Last week I was party to a discussion on LinkedIn regarding recruitment agencies being approached by companies offering them work, mainly just to payroll some employees due to some difficulty…
Read Post

7 Scary Cybersecurity Statistics

7 Scary Cybersecurity Statistics and Recommendations to Improve Security A cyberattack is a scary event. It can shut down your business, cripple government agencies and incapacitate hospitals and other healthcare…
Read Post

We love Veeam!

Many of our team have recommended and sold Veeam over the years, because it’s simply great! Why? Well for over a decade, Veeam has been the leading provider of backup, recovery, and…
Read Post

Are you a sitting duck?

Small businesses are under attack. Right now, extremely dangerous and well funded cybercrime rings in China, Russia and the Ukraine are using sophisticated software systems to hack into thousands of…
Read Post

Cyber Essentials Accreditation

Cyber Essentials and Cyber Essentials Plus Certifications Here at CTO we take IT Security very seriously and have published several posts in the Insight section of our website. These include…
Read Post

The 3P’s of IT Security

As a marketing graduate from long ago (1992 – longer than I care to remember) I can recall the fuss made over the concept of the 4P’s – namely Product, Price, Promotion…
Read Post

Reopening the Workplace After COVID-19

Reopening the Workplace After COVID-19: A Checklist for Businesses The CTO team have done a sterling job supporting businesses during the Pandemic. I, myself, have come back into the business…
Read Post

It’s nice to be appreciated!

It’s nice to be appreciated! With the country currently in ‘lock-down’ due to COVID-19 and everyone scrambling to work from home, Managed Services Providers have been put under significant pressure…
Read Post
Microsoft Teams Tips

10 Good Reasons to Adopt Microsoft Teams

A recent post that popped-up on my personal LinkedIn account highlighted the useful privacy (blurring) feature when using video chat in Microsoft Teams. Some cynics may say ‘that’s a nice…
Read Post

What is a Next Generation Firewall?

What’s so ‘next generation’ about a Next Generation Firewall? In a recent post I discussed Phishing and attempted to demystify the term for the benefit of the average User. Today,…
Read Post

Office 365 Security Defaults

It’s time for Multi-Factor Authentication Following our Insight post stating 99.9% of organisation account compromise could be stopped by simply using MFA, we are encouraging customers to take another step…
Read Post

What is Phishing all about?

Here at CTO we often like to flesh-out a topic in layman’s terms, so Users can understand more about the technology they interact with on a daily basis. Today we…
Read Post

New Year IT Resolutions

Getting fit as part of your New Year Resolutions? Here at Core Team One – we want your IT environment to be equally healthy, which is why we are offering…
Read Post

Should I protect Office 365 data?

Microsoft Office 365 is fantastic, and Microsoft provide a great service to the customers. They focus a lot of energy on the Office 365 infrastructure, maintain good uptime, and allow your users to work with confidence. They also empower YOU with the responsibility of your data.

Read Post

Protect your privacy when using free WiFi

Many businesses are now always on and availability to access company data at any time of the day has dramatically increased. End users are commonly accessing company data through a variety of methods. One of these is free or public WiFi.

Read Post
Menu