Blog

Zero-trust security. It’s time

Zero-trust security. It’s time

Securing your remote workforce with a zero-trust strategy starts today and starts here. The reason for the immediacy is because it’s impossible to stress just how dangerous the current situation is with regard to cyber security. If you doubt our word, then take a look...

5 critical security elements of our Managed Digital Workspace

5 critical security elements of our Managed Digital Workspace

The rapid adoption of remote working has provided hacking groups with new and growing means with which to gain access to accounts and networks. Failure to ensure that every corporate device is continually updated, patched, protected, and connected securely to the...

Could an IT security breach cost you your job?

Could an IT security breach cost you your job?

Ever since the lockdown, millions of employees have been accessing their company’s data from remote locations, more often than not using unsecured internet access. As a direct result, it has provided hackers with a golden opportunity to gain access to corporate...

If you think your data is safe on the public cloud, think again

If you think your data is safe on the public cloud, think again

With its promise of increased efficiency, scalability and agility, more and more organisations are adopting public cloud services. Yet many security professionals are voicing their concerns loudly and clearly; citing security issues such as data loss, data privacy,...

It’s time to tear up the Disaster Recovery Plan rule book

It’s time to tear up the Disaster Recovery Plan rule book

Threats such as viruses, ransomware, and natural disasters that can cause significant downtime are growing by the day. More and more organisations are waking up to the fact that IT uptime is synonymous with business uptime; any outages not only hit the bottom line they can also have a potentially catastrophic effect on your brand.

Why recover from an IT disaster when you can avoid it?

Why recover from an IT disaster when you can avoid it?

Which would you prefer, spending a great deal of time, energy, and money recovering from an unexpected IT disaster, or avoiding it in the first place?    Unless you are a masochist, surely it’s the latter. So why then do organisations spend a large proportion of their...

Quadris awarded a place on the highly coveted TePAS framework

Quadris awarded a place on the highly coveted TePAS framework

We are delighted to announce that Quadris has been named as a supplier on the Crown Commercial Service’s (CCS) new RM6068 Technology Products and Associated Services (TePAS) framework.  This allows Quadris to be considered for call-off contracts to supply deliverables...