News, info and more.
Maria Head of Digital
IT professionals in the public sector will be well-aware of the government’s ‘G-Cloud’ initiative, designed to make it easier to procure cloud services. What you may not be aware of is that Peer 1 Hosting is listed as an official supplier for a number of cloud hosting services.
When purchasing security from a service provider it can be easy to assume that everything is being taken care of and it is no longer your responsibility. But, when something goes wrong do you really know what the processes are? Mike Duncan explains how to clear up any confusion in this video.
The IT decision maker faces numerous challenges when adopting any technology. Ranging from budget restrictions to compliance standards, the life of the IT decision make is a challenging one. However, if successfully integrated, new technologies can make a tremendous impact on both the business bottom line and even employee satisfaction.
Last week we were at Magento Live UK, talking to retailers about how they can optimise their ecommerce sites to meet the growing demands of today’s savvy online shopper.
Hackers often bypass security controls by targeting an entity, which can often be seen as a point of weakness within your existing security network.
More than often this weak point is your staff. Technology safeguards can be made redundant when employees are brought into the equation.
In this video we look at why businesses must provide greater staff education in order to protect critical business information and systems.
We recently held a Peer 2 Peer event for e-retailers, to uncover how curating content can engage customers and drive brand profile and sales. The event featured expert advice from panelists including: Cat Callender, content advisor to the British Fashion Council; Fiona McIntosh, co-founder of Blow Ltd; and Mats Nilsson, managing director of Polarn O. Pyret, UK Ireland.
The panelists shared their views on a range of topics including:
· The importance of an omni-channel presence;
In recent years, companies have been reluctant to implement an internal security directive for staff that properly addresses the problem of phishing content and/or malicious attachments. This has resulted in costly breaches for companies, not only in monetary terms, but also for their reputations within their respective industries.
After several high-profile breaches over the past year, it seems that security is firmly atop the IT agenda. Previously considered to be a problem addressed exclusively through costly firewalls and encryption services, the security concept is undergoing a radical rethink amid claims from some industry experts that a breach is inevitable regardless of the software in place.
As a species, we are notoriously bad at assessing risk. How many of us are frightened of spiders and lightening but cross the road without looking or cheerfully cycle through red lights? I’ll admit to three out of four of these foibles.