vCISO’s corner: budgeting for security initiatives in 2025
Gain insights into how to build a risk-based security budget, understand the challenges and opportunities it addresses, and how to avoid common pitfalls.
Gain insights into how to build a risk-based security budget, understand the challenges and opportunities it addresses, and how to avoid common pitfalls.
Discover how advanced wireless security technologies can safeguard your network from modern cyber threats.
Black Friday weekend presents heightened risks for both consumers and organisations hoping to capitalise on the surge in sales during this period. While the vulnerability of consumers is often the...
With the NIS2 Directive now in effect, stricter regulations and expanded scope mean organisations must act quickly—are you ready for NIS2?
Partnering with a Cyber Essentials certified provider ensures robust cyber protection, builds client trust, and supports your business in proactively managing and minimising cyber risks.
This webinar will provide you with the practical tools and strategies needed to strengthen your cyber defences and improve your organisation’s insurability.
Staying secure for any size organisation is a top priority. One step that businesses can take is gaining a Cyber Essentials accreditation.
In a world of growing threats, building business resilience is more important than ever. Learn how a risk-based approach can help safeguard your organisation and ensure continued success.
As cyber threats become more advanced, businesses can no longer afford to rely on disjointed security solutions. Recent high-profile breaches like MOVEit (2023) have exposed the vulnerabilities in...
This blog highlights the potential misuse of Large Language Models (LLMs) for creating convincing phishing emails and offers tips to help protect organisations from such threats.
October is internationally recognised as Cyber Security Awareness month. Yes – we know it’s not October yet, but for our cyber security team it’s Cyber Security Awareness all year round, and...
Our experts share essential cyber security strategies for small and medium sized businesses, so you can grow and innovate in confidence.
Successful cyber-attacks continue to make headlines. Three different perspectives on recent events combine to shine a spotlight on one key area for focus and action: the role of the Executive and...
In today’s interconnected world, the supply chain has become an increasingly vulnerable area, posing evolving risks and growing threats to business operations and the delivery of services. By...
In today’s interconnected digital landscape, the threat of ransomware looms large, and the consequences of an attack can be devastating for any business. The common misconceptions of...
We are pleased to announce that Redcentric will be attending Fortinet's Security Day on 18th April.
Microsoft Copilot's integration into Microsoft licensing packages and security best practices, positions Copilot AI companion for businesses.
Our experts explore the intricate cybersecurity landscape of 2024, marked by escalating threats, ensuring leadership support and cybersecurity awareness.
A look at the top cyber threats and practical solutions to fortify patient data and hospital systems whilst we help you to navigate the cybersecurity landscape.
This blog explores why organisations often overlook protecting vital data assets (VDAs) that are crucial but not immediately time-critical.
Explore vital cyber security insights: Understanding RTOs, RPOs, and effective data recovery strategies against costly cyber-attacks.
With the alarming surge in cyber threats, as Apple reports a 300% increase in personal data breaches. Our cyber security team delves into the need for heightened awareness.
We’ve highlighted some of the headline stats and takeaways from the recently released NCSC Annual Review 2023 report.
Here are some top tips from Tom Holloway, Head of Redcentric’s cyber security division, to help you safeguard your assets and data.
Read more about our recent study on unique passwords, how Brits protect their passwords and how they create their passwords.
In an era defined by seemingly unending technological advances, with businesses relying more than ever on digital infrastructure and data, the importance of robust cyber security practices cannot be...
We are pleased to announce that we will be attending ScotSoft, one of Scotland's largest software conferences, on the 28th September 2023 at the EICC in Edinburgh.
In this article we look at the what, why and how to vulnerability management to help you stay informed and secure.
On May 31, 2023, Progress Software warned the public about a critical SQL injection vulnerability in MOVEit Transfer, allowing unauthorised access to its database. Identified as CVE-2023-34362 on June...
Ransomware has been hitting the UK headlines recently with the severe disruption to Royal Mail’s overseas deliveries, employee data of The Guardian being accessed and Rackspace’s Hosted...
We were recently invited to celebrate success at an evening hosted by Megabuyte for 2021/22 award winners and alumni. Redcentric delivered a strong financial performance among its peers throughout the...
If you’re responsible for an IT setup then a firewall (or even more than one) is essential to keeping your data protected against cyber attacks. But what actually is a firewall and how does it...
Vulnerability scans are to enterprises what health checkups are to people; they’re proactive check-ins on a system’s health to ensure it stays in tip-top running condition. For companies, a...
Like almost every technology innovation ever, for every problem it solves, it trails another along in its wake. Take SD-WAN. It’s a popular choice for those looking for MPLS-level Quality of Service...
To build an operating model that allows you to respond quickly to business needs, you need to look forward to your roadmap and outside factors. This blog looks at how other customers have built an...
Every year, cybercriminals find and take advantage of a corporate system’s vulnerabilities. They feast on open communication protocols and exposed databases that show no sign of regular security...
A third of UK businesses lose customers after a cyber attack. cDiscover how a data centre an support your cyber security.
Redcentric is honoured to announce that they have been named in Cloudtango’s 2022 Top Enterprise Global100 MSPs. These prestigious lists recognise the top performing Managed Service Providers (MSPs)...
Redcentric plc, a leading UK IT managed services provider, is pleased to announce the acquisition of 7 Elements. 7 Elements is a CREST accredited and award-winning business which provides industry...
Productivity tools enable your teams to work better, but with various solutions available how do you start to create your digital workspace?
Choosing the right virtual desktop can be hard. We look at four of the most popular platforms, their pros and cons and our recommendations.
Credential stuffing can leave your business vulnerable. We look at the dangers of credential stuffing and what your business can do to stay protected.
A proactive mindset and a SIEM strategy in place, businesses can massively reduce the risk of a cyber-attack. But what exactly is SIEM? Find out more in this article
Did you know that, without sufficient cyber security , your retail business could face fines of up to €20 million? Not only that, but your reputation could also suffer irreparable damage. Indeed,...
When was the last time someone leaned over your shoulder and fixed your technical problems with a few clicks? Unless you have a particularly handy spouse (or teenager), the chances are it’s been a...
Hybrid clouds allow organisations to benefit from both public and private cloud models. But how do you keep your hybrid cloud secure? Here are the best practices.
Every company needs to backup their system since it’s the only line of defence against several threats that can corrupt or invalidate your data, but you need to make sure your backup is capable of...
Secure remote access to HSCN services and data provides clinicians critical information to support them to make informed decisions on the move. Get your questions answered below on HSCN secure remote...
At Redcentric we’ve a long history of doing business with the public sector, and like anyone else working within this sector we’re well aware of the Government’s Business Impact...
For all the media’s fascination with the apparent inexorability of uber-sophisticated cyber attacks on our nation’s businesses and organisations, recent events have shown that security risks can...
Data backup is required by all businesses. With legal requirements tightening and data volumes growing out of control, traditional tape backup is no longer a reliable or cost effective means of...
As an IT professional with a particular interest in data and Cloud services, I often stumble across nuggets of information that grab my attention. I’m sure I’m not alone in my fondness for facts...
Firewalls are an essential part of a company’s cyber security, but there are different types of firewall available and you need to deploy the correct firewall for your company to ensure you are...
DDoS (Distributed Denial of Service) is an effective and dangerous form of cyber attack that requires specific protections in place to defend your IT. How does a DDoS attack work? DDoS attacks flood...