Unleashed IT Consultancy Blog

/Unleashed IT Consultancy Blog

Help to mitigate cyber attacks

What are cyber attacks? We keep hearing the words, cyber attacks, hacking, viruses, worms and malware. What does it all mean? More importantly, what can be done to help you to mitigate cyber attacks? By taking some simple steps you can  protect your business, protect your data and take steps to prevent these attacks happening to you? [...]

By |February 1st, 2016|Security|0 Comments

What does Brexit mean for UK Data Protection?

Brexit.  Leaving the EU and it’s laws.  As a long time geek I’ve had the principles of the UK Data Protection Act drummed into me since I studied GCSE IT. It is the foundation of how we lay out the responsibility and liability for the care of the personal data we share with companies and other organisations – the data controllers. I should say, I’m not a lawyer, I’m an IT guy come Information Security Practitioner, so I’m trying to get my head around this from a business and technology perspective… […]

  • Share on Tumblr
By |January 13th, 2016|Security|0 Comments

Strange start to 2016! Cyber Essentials and more.

I would like to wish all our regular and new readers a very Happy New Year. It has been a strange start to 2016, we finished off last year relatively quiet, which was nice, but 2016 has gone off like a rocket and long may it continue. Yes, we are still working on a lot [...]

By |January 12th, 2016|Security|0 Comments

Do you value IT?

I have been advising SME's on IT for many years now and from experience, I know they can be split into two categories - Companies that value IT and companies that don't. So the question to you Mr/Mrs Business owner is - Are you realising the investment you have made it IT? or to put [...]

What Makes an IT Strategy Template Effective?

Whether you're a technical luddite or a computer whiz, your business needs an IT strategy. It's just common business sense to outline your plans when it comes to IT in advance, so you're not running around like a headless chicken when it eventually comes to putting elements of your strategy into action. So what can [...]

By |December 7th, 2015|Managed Services, Smarter Working|0 Comments

What are the Benefits of a Data Archive?

We have all heard and probably used the colloquialism “how long is a piece of string,” but in a similar vein we often get asked “how long should we archive data for?” This is a really difficult question and the only answer we can give is “for as long as you're likely to need it.” At [...]

By |December 2nd, 2015|Disaster Recovery|0 Comments

The Importance of Internet Connectivity

Over the last few months, I have done quite a few posts about the benefits of IT Managed Services, Data Storage and Archiving, Disaster Recovery and Backup. But what do all of these solutions have in common, and without such a thing nothing in the wonderful world of IT will work? Very simply, it is your [...]

By |November 26th, 2015|IT Consultancy|0 Comments

How to Plan Your IT Budget in 4 Steps

In the world of business, money makes the world go round. I shouldn't have to tell you that, but it's important to note regardless as tech companies - when starting out - have been known to bite off more than they can chew. It's fairly easy to do, and unfortunately contributes to that grim statistic [...]

By |November 25th, 2015|Smarter Working, Solutions, Technology|0 Comments

How to Take Control of a Chaotic IT Strategy

While your IT strategy (or indeed any form of business strategy) should be taken seriously lest you doom yourself to failure, we understand the process of forming what is often a complex series of plans, failsafes and otherwise can be a daunting and stressful task. However there are ways to take control of the madness [...]

Must have tools for ISO 27001 Compliance Projects

Here at Unleashed, we take a very different approach to what we do with ISO 27001 compliance.  There is a whole world of consulting around the ISO Management System Standards. This tends to focus on the compliance and adherence to the letter of the standards - paperwork, paperwork and more paperwork! Whilst the consultants are [...]

By |November 18th, 2015|IT Consultancy, Security|0 Comments