Articles

Immutable backup storage - the last line of defence
We all know that using an air gap within a backup solution to put space between you and cyber criminals is vital, but with discussion around the security – or lack thereof - of data more prevalent…

Life’s a breach – saying goodbye to cyberattacks
Life's a Breach was an exciting event we hosted in association with ALARM.

How DORA capabilities are shaping software delivery
As a bespoke software developer, you really only have one goal: deliver high-quality software that meets the needs, and exceeds the expectations, of your clients

Couch to 365 | Gathering Intel
This is part of the Couch to 365 series, developed by Waterstons. If you haven’t already, sign up now for free at Couchto365.com.

Knock Knock: Opening the door to service design
How can you be sure that the person at your door is really from British Gas? Or the IT engineer is really from Waterstons? How can an app help answer those questions? Innovation Consultant Katie…

Cybercrime doesn't stand still - know how and when to act
As technology, systems and software become more sophisticated, so do the threat actors and their methods for infiltration.

Gone phishing
Even cyber attackers have new year's resolutions...
Little and often: safeguarding business fortitude through strategic vulnerability management
The need to fortify digital defences is more than simply a necessity, it’s a strategic mandate. Strategically embracing vulnerability management to assert its pivotal role in preserving…