Blog

/Blog
Blog2017-05-10T12:56:34+00:00

Two-Factor Authentication

Every business needs two-factor authentication. Why? Very simply, it protects your users from getting scammed by protecting their password. We live in a digital age, this means, everything we do is now online which creates data, no more so in your business. To be blunt, your data is your business and without it, you will not have one for long. This means business owners have a legal requirement to protect their data. Unfortunately, there is no one solution that you can employ. You must take a multi-layer approach to data [...]

By |February 4th, 2019|Cyber Security|0 Comments

Workflow Automation

Workflow automation is the act of moving manual tasks to an automated process. We use workplace automation to improve the flow of information around your business. When data flows around your business in an efficient manner you suddenly become more productive, you get more done and you can concentrate on driving and building your business. Five good reasons for adopting workflow automation Efficiency By automating tasks, you save time and you reduce the number of errors that occur on handwritten forms – whether this is inaccurate information being recorded or [...]

By |November 29th, 2018|Digital Transformation, Unleashed|0 Comments

Unleashed are 7 years old!

I'm sure some of our long-standing customers will know our heritage is quite a few years older, but if we're to look at the official Companies House record I should have bought a few cakes this week... It's our 7th birthday!!!  We are obviously too busy working on behalf of customers to celebrate! That's seven years of hard work, sacrifice, integrity, passion, flexibility, innovation and disruption! I certainly like to thank our customers for ensuring we're still here, thriving and working on new and exciting areas of IT and Digital Transformation each [...]

By |November 9th, 2018|Unleashed|0 Comments

Cyber Kill Chain

What is the cyber kill chain? To explain what this is, we first have to look at the whole process of the cyber-attack. To stop a cyber-attack, you first have to understand the process that the purveyor of the attack goes through. And, more importantly, know what the end goal of the attack is. There are various types of cyber-attacks and each one has a different goal or objective. But by far the most dangerous are those initiated for and by, organised crime gangs. We class these as Advanced threats and [...]

By |September 19th, 2018|Cyber Security, GDPR, Security, Unleashed|0 Comments

It won’t happen to me…

Do you have an “it won't happen to me” disaster recovery policy? If so, you may want to read this! Everybody thinks they are protected. That a disaster is not going to happen to them, correct? Well, what if a disaster that has nothing to do you happens, and stops you from doing business. I suppose that is what happened in Glasgow. Back in March 2018, there was a fire in Victoria’s nightclub. This closed a lot of businesses in and around Sauchiehall Street. One good example is the Pavillion [...]

By |September 10th, 2018|Unleashed|0 Comments

Why did the British Airways Data Theft Happen?

British Airways, or as us self-respecting Northerners call it - "Heathrow Airways" has suffered a large data theft.  This has come in a string of IT Debacles that have occurred over the last 18 months. In July, there were IT issues causing some flights in and out of Heathrow to be cancelled.   The month before, they cancelled 2000 tickets because they'd undercharged.  More worryingly, in 2017 the airline had a serious data centre power fault causing all flights to be suspended. There's no question that our capital's flag carrier (see [...]

By |September 7th, 2018|Cyber Security|0 Comments