6 Questions You Should Ask Before Choosing a Managed Service Provider

Choosing the right managed service provider (MSP) is one of the most important technology decisions an SME can make. The National Cyber Security Centre (NCSC) provides a helpful checklist of questions every organisation should ask before committing to a partner for managed IT services, from security certification to service quality and transparency. Below we walk […]

Your Backups Won’t Save You: What Ransomware Recovery Requires in 2026

Ransomware recovery 2026

When Marks & Spencer was hit by a ransomware attack over Easter 2025 – with attackers deploying the DragonForce encryptor across its systems – the retailer fortunately had backups. It had a security team, incident response procedures, and decades of operational expertise. None of that stopped the attack from wiping an estimated £300 million from […]

The Benefits of Cyber Essentials and Beyond

Cyber Essentials

Benefits of Cyber Essentials Cyber attacks are now a constant threat for organisations of every size. From phishing and ransomware to attacks targeting unpatched systems, most incidents exploit basic, preventable weaknesses. Cyber Essentials, the UK government‑backed certification scheme, is designed to stop exactly these kinds of threats but only when the controls are implemented and […]

5 Trends Impacting Cyber Security in Education in 2026

Cyber security has become a core operational and safeguarding issue across the education sector. The 2025 UK GOV Cyber Security Breaches Survey makes this clear, revealing that education remains highly targeted. At a time when cloud platforms, digital learning and online communication underpin day-to-day operations, threat actors are exploiting persistent gaps in infrastructure, training and […]

Cyber Resilience Vs Cyber Security

Cyber Security Vs Cyber Resilience

Cyber Resilience vs Cyber Security: Why Your Business Needs Both Understanding the Difference For years, cyber security has focused on prevention to keep attackers out. These measures remain essential, but through our experience of over 200 ransomware recoveries the reality is clear: no organisation can guarantee complete protection. Cyber attacks are becoming more targeted, sophisticated, […]

Why Traditional Data Backups Aren’t Enough

Why Traditional Backups Aren’t Enough: How Immutable Storage and Anomaly Detection Keep Data Safe

How Immutable Storage and Anomaly Detection Are Transforming Data Security When it comes to data protection, the rules have changed. Cyber threats are becoming more sophisticated, downtime is more expensive than ever, and many organisations are discovering that traditional backup strategies alone are no longer enough. While backups remain essential, modern resilience requires a smarter […]

Why Slow Data Recovery Is Your Biggest Cyber Resilience Risk

Why Slow Data Recovery Is Your Biggest Cyber Resilience Risk

Can You Recover Fast Enough? Recovery isn’t just about whether systems can be restored, it’s about how quickly they can be restored. If recovery takes weeks, the delay and loss of access can be as damaging as the incident itself. Ultimately, recovery speed determines whether a disruption is manageable or business-threatening. Why Rapid Recovery Really Matters Today, recovery isn’t about restoring data eventually. It’s about restoring access quickly […]

From Backup to Built-in Resilience

If Your Organisation Was Hit by a Cyber Attack Tomorrow, Would You Be Ready? When we talk about cyber security, prevention usually dominates the conversation. But when an attack actually happens, one question matters more than any other: can your business recover? Why Backup Strategy Determines Resilience Backup strategies deserve far more attention than they […]

Mind the Gap! #3 – Misconfigurations

screen in data centre with code running on it with text in the middle that says mind the gap

Security misconfigurations often fly under the radar because they’re not as immediately visible as a glaring software vulnerability or a high-profile zero-day exploit. However, they can be just as dangerous – if not more so. A misconfiguration is essentially a security setting that has been incorrectly or incompletely set up, leaving a door open for […]

Mind the Gap! #2 – Bridging the Human Factor

laptop in coffee shop with plain screen that reads mind the gap

When discussing cybersecurity, it’s easy to get caught up in the latest technologies: state-of-the-art firewalls, AI-driven threat intelligence, and advanced endpoint protection. However, a robust security posture isn’t just about hardware and software – it also hinges on people. Humans can be your greatest security asset, but they can also be your most significant vulnerability. […]