Select Page

Diary of a Cybersecurity Specialist: The Stealth Attack 

It was the first day of a long weekend when the first alarm notification was received. One of our client’s laptops had detected malware. Initially, it seemed like an isolated incident – perhaps a careless click on a phishing link. But, as our team...

Why engaging IT contractors in a recession is the best option

The average time to fill a vacancy has doubled in the past six months, and although applicant numbers are at an all-time high, good people are still hard to secure. Adding ‘Recruiter’ to your already overloaded task list and wading through hundreds of unsuitable...