Blog: Cyber Security

NIS2: Are you ready?

With the NIS2 Directive now in effect, stricter regulations and expanded scope mean organisations must act quickly—are you ready for NIS2?

Understanding the cyber threat landscape

In a world of growing threats, building business resilience is more important than ever. Learn how a risk-based approach can help safeguard your organisation and ensure continued success.

Why a virtual CISO makes sense for your business

As cyber threats become more advanced, businesses can no longer afford to rely on disjointed security solutions. Recent high-profile breaches like MOVEit (2023) have exposed the vulnerabilities in...

Remote working securely with Virtual Firewall

An LLM thoughts on using LLM in phishing

This blog highlights the potential misuse of Large Language Models (LLMs) for creating convincing phishing emails and offers tips to help protect organisations from such threats.

ScotSoft 2023

We are pleased to announce that we will be attending ScotSoft, one of Scotland's largest software conferences, on the 28th September 2023 at the EICC in Edinburgh.

FAQs

MOVEit Transfer Vulnerability

On May 31, 2023, Progress Software warned the public about a critical SQL injection vulnerability in MOVEit Transfer, allowing unauthorised access to its database. Identified as CVE-2023-34362 on June...

redcentric-logo

Celebrating success

We were recently invited to celebrate success at an evening hosted by Megabuyte for 2021/22 award winners and alumni. Redcentric delivered a strong financial performance among its peers throughout the...

IT Security worker on tablet

Top 10 benefits of vulnerability scanning

Vulnerability scans are to enterprises what health checkups are to people; they’re proactive check-ins on a system’s health to ensure it stays in tip-top running condition. For companies, a...

Secure remote working

Secure SD-WAN: peace of mind for your network

Like almost every technology innovation ever, for every problem it solves, it trails another along in its wake. Take SD-WAN. It’s a popular choice for those looking for MPLS-level Quality of Service...

redcentric-logo

Redcentric acquires 7 Elements

Redcentric plc, a leading UK IT managed services provider, is pleased to announce the acquisition of 7 Elements. 7 Elements is a CREST accredited and award-winning business which provides industry...

Woman working remotely using softphone voice

How to create a digital workspace

Productivity tools enable your teams to work better, but with various solutions available how do you start to create your digital workspace?

Why Redcentric For Secure Remote Access

HSCN Secure Remote Access Tokens FAQs

Secure remote access to HSCN services and data provides clinicians critical information to support them to make informed decisions on the move. Get your questions answered below on HSCN secure remote...

Our Partnership Focus

Business impact levels

At Redcentric we’ve a long history of doing business with the public sector, and like anyone else working within this sector we’re well aware of the Government’s Business Impact...

Why Redcentric For Cloud Migration

Top 10 tips for choosing a data backup service

Data backup is required by all businesses. With legal requirements tightening and data volumes growing out of control, traditional tape backup is no longer a reliable or cost effective means of...

Why Redcentric For Cloud Migration

Did you know? Interesting data and storage facts

As an IT professional with a particular interest in data and Cloud services, I often stumble across nuggets of information that grab my attention. I’m sure I’m not alone in my fondness for facts...

Firewalls Explained: Types of Firewalls

Firewalls are an essential part of a company’s cyber security, but there are different types of firewall available and you need to deploy the correct firewall for your company to ensure you are...

Why Redcentric for Security Monitoring & Analytics

DDoS attack: how can one affect your business?

DDoS (Distributed Denial of Service) is an effective and dangerous form of cyber attack that requires specific protections in place to defend your IT. How does a DDoS attack work? DDoS attacks flood...

redcentric

Redcentric

0800 983 2522 sayhello@redcentricplc.com