solar-bg-2.jpg

Category: Blog

Blog

Cybercrime And Countermeasures, cybersecurity, Network & Data Security, ransomware, security, Cloud Communications, Data Security, IT security

The Most Important Thing For Your Business Is….

Security of course. Given the rise in the number of ransomware attacks over the course of 2017, security and mitigation from attacks is something that has become more prevalent than ever. If you ...
Continue Reading
By : Elliot Dacosta / 18 December, 2017 /

communication, cyber security, Network & Data Security, News, Petna, petya, ransomware, security, attack, Blog, hardware, Industry News, ISO

Ransomware: It’s happened again….

Today we woke up to the news of yet another ransomware attack targeting businesses around the globe. Ukraine seems to have felt the brunt of the Petya attack which renders you unable to log into your ...
Continue Reading
By : Elliot Dacosta / 28 June, 2017 /

cyber-attack, cyber security, datto, eBook, Posts, ransomware, security, unified communication, Unified Communications, Blog, Industry News

Datto has you covered...

With the recent spell of ransomware attacks security is becoming an increasingly debated topic. Download this Ultimate Recovery Guide from Datto to help you stay one step ahead of potential disasters!
Continue Reading
By : Elliot Dacosta / 28 June, 2017 /

cyber-attack, Posts, security, technology, Blog, data, IT, telecoms

Is your business ready?

In light of the global cyber-attack this weekend, there is still an impending threat of yet more ransom attacks coming to light today as workers turn their computers back on after the weekend.
Continue Reading
By : Jess Jepson / 15 May, 2017 /

BYOD, mobile device management, mobile workforce, News, remote working, security, UC, Unified Communications, Blog, Industry News, MDM, Solar Communications, unified communications

Solar mini guides series: How to enable a mobile workforce

Technology is affecting almost every aspect of our lives and fast influencing the world of work. Advances in technology and the rise of the smartphone generation means that people are now connected ...
Continue Reading
By : Jess Jepson / 29 January, 2017 /

Balabit, cybercrime, cybersecurity, IT protection, prevent malicious activities, privileged access, privileged access management, privileged user monitoring, privileged users, real-time analytics, response data comms, security, SMB, suspicious users, user behaviour analytics, Blog, business, contextual security intelligence, cyberattacks, data, data breach, data breaches, enterprise IT security, IT, IT security, Response Data Communications, SaaS, SME

How to Prevent Data Breaches Without Constraining Your Business

Despite IT security budgets increasing year on year and organisations spending millions on security technology and software, data breaches continue to make big news. A recent Government survey shows ...
Continue Reading
By : Maria Milenkova / 20 January, 2017 /

communications costs, News, Posts, security, Skype, technology, Unified Communications, Unified Communications, VoIP, business, interactive, Solar Communications

The VoIP Revolution

In the business world, direct and uninterrupted communication with clients and customers is arguably the most critically important factor in safeguarding a company’s interests and more fundamentally; ...
Continue Reading
By : Jess Jepson / 20 October, 2016 /
1

Subscribe to Email Updates

LATEST POSTS

CATEGORIES

TAGS