Alexa metrics

Should Businesses Hire a Hacker to Solve Security Woes?

29.6.2012 by Alice Cullen

As cyber threats increase in frequency and sophistication, protecting business infrastructure from them seems like an impossible task. Could hackers be the solution to businesses' cybersecurity woes rather than the problem? Ethical hacking seems to be a contradiction in terms but big firms are adopting the technique to ensure their systems are locked down, transforming the hacker from foe to friend. Web behemoths including Facebook, Google and now PayPal are offering rewards to hackers who crack into their technology infrastructure and report their methods, and their security flaws, back to them with the assurance of no legal backlash. UKFast's director…

#BackToBasics – What is Virtualisation?

28.6.2012 by Alice Cullen

With so many buzz words surrounding business technology it can be difficult to see the wood for the trees. In this post we break through the hype to examine what virtualisation is and what it can do for your business.…

HTML5 Key to BYOD?

21.6.2012 by Alice Cullen

As the popularity of 'bring your own device' working skyrockets, businesses are concerned by the high costs associated with the set up. Whether you realise it or not, more and more employees are switching on to the idea of Bring…

June 2012 Microsoft Security Bulletin Release

20.6.2012 by Micro-Clouseau

As mentioned in the advanced notification, this month there are seven security bulletins addressing twenty three vulnerabilities: 3 bulletins are rated as critical 4 bulletins are rated as important 4 bulletins addressing vulnerabilities that could lead to Remote Code Execution…

Dogma in IT: Why System Administrators Need to Rethink Trust

20.6.2012 by Alice Cullen

In the latest guest post from our resident Linux guru, we take a look at the idea of trust in managing systems integrity. One of the things that really bothers me about the IT community at large, especially in larger…

#BackToBasics – RPO and RTO

18.6.2012 by Alice Cullen

It would be fair to say that without the internet, computers or technology, many of today's businesses would flounder. Let’s think for a minute about what would happen if your business's computer systems failed. No email. No SQL database with…

The Big Data Debate: Over-Hyped or Under-Appreciated?

15.6.2012 by Alice Cullen

As the big data hype train rolls on so does the increasing scepticism about the amount of actual deployable technology that exists to deal with it. On one side, big data is the future of business and the saviour of…

AMD to Integrate ARM Design Into x86 Chips

14.6.2012 by Alice Cullen

Advanced Micro Devices (AMD) has revealed that the company is to integrate ARM-designed security technology into its x86-based processors in the latest sign of an increasingly warm relationship between the two chip-makers.

Special Service for a Special Day

12.6.2012 by Guest

Today I had a 9am call with one of our biggest clients. It is a huge time for them and so I made myself available to ensure all questions could be addressed and we could participate in their big week.…

Time to Protect Ourselves

7.6.2012 by Alice Cullen

This week professional network LinkedIn and dating site eHarmony were the subjects of an embarrassing hack, exposing their – and their users’ – shortcomings in password security. The hacks show us yet again that we can’t rely on big sites…