Our blog

Discover our Insights

Stay up to date with what we have been doing, how we're helping our customers and what our experts are saying

Filter:

  • IT Services
  • IT Solutions
  • News
  • Partners
  • Podcasts
  • Sectors
  • Uncategorized
    Cyber Security Series: 2. Power to the People
    Who’d be a CISO nowadays? Expected to set and oversee information security strategy, and potentially take the fall should a breach occur. You need eyes in the back of your network, trust in your team and the ability to influence the board with sound business arguments, not horror stories. The world’s first CISO is widely...

    Cyber Security Series: 2. Power to the People

    SCC to feature at Cyber Security Conference
    SCC’s Head of Innovation, Dan Cartter, will speak at the Cyber Security: Business Insight Conference on Wednesday 17th October. The half-day conference, taking place at Bournville College, Longbridge, will host presentations and discussions that examine cyber breaches and their risk to brand reputation and customer trust. The morning will feature the presentation ‘Be on the...

    SCC to feature at Cyber Security Conference

    Cyber Security Series: 1. The Golden Hour
    It’s 4:30pm and you’re in the middle of a meeting when you’re interrupted by one of your technical architects. They want to let you know that they think there’s been a security breach so could you come down and help them check it out please? Before you can make your excuses however, they’re back in the room...

    Cyber Security Series: 1. The Golden Hour

    How secure is your data centre?
    Most, if not all data centres, employ strong measures to help protect client information from unseemly access or use by unauthorised persons, either externally or internally. But with a world now firmly in the digital age, and a hacking community more sophisticated and complex, you may be wondering just how secure is your data centre?...

    How secure is your data centre?

    Fancy a cookie or two? Only if they’re compliant
    We’ve all heard the word ‘cookie’ banded around, especially in the wake of GDPR, but sadly in the IT world, this one is not made of chocolate chips. Many people are still unfamiliar with the exact meaning of the word cookie and more importantly, the cookie law. Here, SCC explains exactly how cookies work, and...

    Fancy a cookie or two? Only if they’re compliant

    NHS Fax Machines Vulnerable to Hackers
    Legacy technology could be leaving the NHS open to cyber attacks, according to new research. The discovery was made by staff at Check Point Software, who found exploits in widely used fax machines that could allow hackers to spread malware through a malicious image file.  Check Point uncovered that malware could be coded into an...

    NHS Fax Machines Vulnerable to Hackers

    How GDPR is being used to scam you
    The advent of the General Data Protection Regulation (GDPR) should bring with it some feelings of reassurance and heightened security. However, some cybercriminals are using it to their advantage in order to exploit unknowing users. According to the Independent, fraudsters have been posing as banks over email and using GDPR as an excuse to extract...

    How GDPR is being used to scam you

    AI to grow at an ‘exorbitant pace’ in cyber security
    Artificial intelligence (AI) in the global cyber security market is projected to grow at a CAGR of 36% during 2017-2023, reaching $18.1 billion by 2023. The research, conducted by P&S Market Research, suggests that the rising number of cyber frauds and malicious attacks is the major factor driving AI demand in the cyber security market....

    AI to grow at an ‘exorbitant pace’ in cyber security

    Hacked off? Here’s the Solution to Ensuring Data Security
    A new survey conducted by security and systems management company Tanium indicates that 40% of businesses feel more exposed to cyber attacks than ever before – and there is good reason for it. The truth is it’s easier than ever for someone to become a hacker and with GDPR just around the corner, it is vital...

    Hacked off? Here’s the Solution to Ensuring Data Security

    Consumers will ‘punish’ businesses that fail to protect data
    New research from multi-cloud data management firm Vertias Technologies has suggested a lack of trust in businesses’ ability to protect data, and that consumers will penalise those who fail. The statistics are taken from Veritas’ Global Data Privacy Consumer Study, which reveals insights from 12,500 consumers across 14 countries, including 1,000 consumers from the UK....

    Consumers will ‘punish’ businesses that fail to protect data

    Why Healthcare IT needs Hyperconvergence
    Unreliable and non-responsive IT systems are a no-no in healthcare. As technology weaves its way into every aspect of the practitioner-patient relationship, one IT-blow could literally mean life or death. Healthcare’s technological infrastructure cannot afford to be delicate. Yet worryingly, the sector is a prime target for cyber criminals. According to IBM’s X-Force Threat Intelligence...

    Why Healthcare IT needs Hyperconvergence

    The three cyber threats that must be on your radar in 2018
    Criminals are launching more attacks on UK businesses than ever before. Enterprises across the country have had to up their game in an attempt to protect themselves from ransomware, data breaches and weaknesses in supply chain.   It just takes a quick Google search of ‘cyber attacks’ to see the sheer amount of news coverage...

    The three cyber threats that must be on your radar in 2018

    CONTACT US
    Scroll to Top