5mins to Cyber Essentials Plus – User Access Control

Check out this five minute video to find out how you can get prepared for cyber essentials plus. This week’s video is all around user access control.
Norfolk and Norwich Hospital | Healthcare Innovations

For the first time, staff across the Trust will be able to record patient observations electronically, which are then fed into a central system so that they are always updated and available for the care professionals looking after the patient.
The system will bring huge benefits to patients, both in terms of the availability and accuracy of their information and enhancing efficiencies for staff to meet their care needs.
5mins to Cyber Essentials Plus – Secure Configuration

Check out this five minute video to find out how you can get prepared for cyber essentials plus. This week’s video is all around secure config.
5mins to Cyber Essentials Plus – Firewall

Check out this five minute video to find out how you can get prepared for cyber essentials plus. This week’s video is all around firewalls.
Surviving Audits and Compliance…

No business or organisation can get away from it entirely, whether you’re bound by regulatory requirements, internal processes, or external accreditations, and there are ways of approaching audit and compliance as a positive experience. Honestly – bear with me!
What Makes a Secure PKI Solution? CRLs

The Certificate Revocation List (CRL) is a list of Certificates that have not expired but have been revoked where clients and services can verify presented or held certificates.
What Makes a Secure PKI Solution? Backups

Just as with any other system within your organisation, PKI needs to be backed up regularly to ensure it can be restored in event of a disaster. So the Operating System, Disks and Virtual Machine are a given, but with PKI you also need to…
What Makes a Secure PKI Solution? Physical Access

Apart from obvious server security aspects such as patching, with PKI solutions there are also considerations relating to cryptography and even physical access. These are rarely documented as a consolidated list, so we decided to try and lay out what we look for and why in a PKI solution.
Quick Wins for Remote Device Management

Three Quick Wins for Enterprise Device Management (from Anywhere in the World!)
We’re going to run through three key tactics that will help you manage devices more easily, no matter where in the world you’re logging in from.
Defining Your Holistic Patch Management Strategy

Create an effective, holistic strategy for managing patching updates and devices – keeping your IT infrastructure secure and compliant!