IT’s About Time…for our December newsletter
Friday, 11 December 2020
It is the season to be merry, spending quality time with your family, your community and your colleagues and put that time consuming IT on the back burner (if you can) and recharge yourself for what promises to be a very different 2021!… In all years prior to this one, this really would have been
- Published in Blog, Newsletters
No Comments
IT’s About Time…for our Autumn newsletter
Friday, 16 October 2020
Autumn is most definitely here and days are most definitely drawing in. Before you know it we will have arrived in the depths of Winter. It is therefore easy to appreciate why October the 10th was selected by the World Health Organisation (WHO) as the world mental health day. I would not for a second suggest
- Published in Blog, Newsletters
Isn’t About Time that You Stopped IT Noise Threatening Your Recoverability?
Tuesday, 28 January 2020
Article by Nigel Tozer, Solutions Marketing Director EMEA, Commvault The ‘noise’ generated by today’s IT more damaging than you think. I’m not talking datacentre racks, fans and cooling here, I’m talking about the sheer amount of data that software and management systems throw at you these days, and importantly the actions that are driven by
- Published in Blog
Cisco On Cisco: Meraki Systems Manager
Monday, 27 January 2020
Simplifying Cisco’s BYOD model with scalable, enterprise-grade MDM The growing trend of Bring Your Own Device (BYOD) brings a lot of benefits to the workplace. BYOD provides employees with flexibility to leverage more connectivity options while increasing productivity and satisfaction by allowing employees to work where and when they want to. 78% of organizations in
- Published in Blog
Cybercriminals Escalate Impersonation Attacks During Tax Season
Tuesday, 21 January 2020
With the 2020 tax season underway, cybersecurity analysts are seeing an increase in the number of impersonation attacks focused on stealing personal information through voice phishing, texts, and email. According to the Daily Mirror and other news sites, taxpayers are at their most vulnerable during income tax self-assessments due to uncertainties over filing processes. Other
- Published in Blog
Own Your Identity So That a Hacker Can’t
Monday, 20 January 2020
Would you bet your business on the strength of every employee’s password? Just one employee’s stolen credential is all it takes to bring down your whole business. So what? With that stolen credential, a hacker can travel through your system to install malware (think ransomware!), steal information for competitors, leak confidential client information, access company
- Published in Blog
This Year, Resolve To Be Ready For Ransomware
Thursday, 16 January 2020
It’s a new year. Like many of you, on New Year’s Eve, I gathered with friends and family in the countdown to midnight and joined people in singing, “Should Auld acquaintance be forgot, and never brought to mind.” Well, if you want to forget about your old acquaintances, that’s your choice. But here’s something you
- Published in Blog
The Achilles Heel of Next-Gen Firewalls
Wednesday, 15 January 2020
Results of a global study of 3,100 IT managers in 12 countries. Network security is the bedrock of every organization’s cyber defenses, the foundation on which other protection services such as endpoint, server, mobile and encryption are layered. It’s the trusty work horse that plays a pivotal role in keeping organizations moving. To better understand
- Published in Blog
Does your network keep you up at night?
Tuesday, 14 January 2020
CIOs: Does your network keep you up at night? It should. What keeps CIOs up at night? According to CIO Magazine’s annual survey of CIO concerns, everything from security threats, to data protection, to the skills gap to digital transformation are top-of-mind. What’s not on their list? Their networks. The heart of the concerns they
- Published in Blog
4 Essential Requirements To Protect Against Brand Exploits
Tuesday, 07 January 2020
The increasingly digital global economy has created a “perfect storm” for cyber attackers. As our reliance on websites and email to interact with organizations has grown, so too has the opportunity for criminals who are increasingly preying on the trust we have in these organizations. Sophisticated attackers are hoodwinking their targets by posing as trusted
- Published in Blog
FROM BRIGHTON PAVILION TO LEEDS – 30 YEARS AND COUNTING OF PAV!
Wednesday, 12 September 2018
PAV IT Services is celebrating its 30th birthday! To celebrate we’re having a quick look back at how the world has evolved in those three decades, the changes we’ve experienced as a business, and our plans for the future that are designed with our customers at the front and centre. From Reagan and Thatcher to cloud and
- Published in Blog
- 1
- 2