Insights

Read all about the latest news and insights from our industry experts focusing on advancements, developments and cybersecurity.

Poor Business IT Support Is Common, But Complacency Makes It Stick
Featured Articles

Poor Business IT Support Is Common, But Complacency Makes It Stick

How bad does your IT support need to be until you do something about it? That’s a question I’ve often asked myself when I talk to new ...

Read More

Filter by

Opinions

Cloud

Cybersecurity

Backup & Recovery

Digital Transformation

Product Info

featured image for post: Common IT Support Issues: The Cost of Complacency
Opinions

Apr 16, 2026

Common IT Support Issues: The Cost of Complacency

How bad does your IT support need to be until you do something about it? That’s a question I’ve often ...

featured image for post: Avoid Azure Landing Zone Failures: Key Success Tips
Cloud

Apr 15, 2026

Avoid Azure Landing Zone Failures: Key Success Tips

In this blog post, we're addressing Azure landing zone best practices that serve as a solid basis for now and the future, so you don't ...

featured image for post: Patching: A Window Into Serious Organisation Security
Cybersecurity

Apr 8, 2026

Patching: A Window Into Serious Organisation Security

A recent report found that more than

featured image for post: The Identity Attacks Hitting Entra ID Right Now
Cybersecurity

Mar 31, 2026

The Identity Attacks Hitting Entra ID Right Now

MFA still matters, but the biggest Entra ID attacks now happen after sign-in, so if you want to see how prompt fatigue, stolen tokens, and hijacked sessions are ...

featured image for post: Azure Hybrid Disaster Recovery: Real RTO/RPO Patterns
Backup & Recovery

Mar 25, 2026

Azure Hybrid Disaster Recovery: Real RTO/RPO Patterns

In this blog post, we'll be addressing how you get around the awkwardness of hybrid estates to design a successful disaster recovery strategy. This ...

featured image for post: Rogue Apps in Entra ID: The Quiet Path To Tenant Compromise

Mar 19, 2026

Rogue Apps in Entra ID: The Quiet Path To Tenant Compromise

Unauthorised application registrations pose critical security risks to cloud environments—discover how robust identity access governance acts as your first line of ...

featured image for post: AI Vulnerability Detection: Why Patching Remains Vital
Cybersecurity

Mar 11, 2026

AI Vulnerability Detection: Why Patching Remains Vital

In this blog post, we address real cases of vulnerability discovery with AI but also ...

featured image for post: Hybrid Cloud Strategy: Azure vs. Private Cloud by Workload
Digital Transformation

Mar 5, 2026

Hybrid Cloud Strategy: Azure vs. Private Cloud by Workload

This post addresses how different kinds of workloads suit either a private or public cloud hosting environment. If you're unsure which ...

featured image for post: Azure UK South Capacity: Key Facts and Preparation Guide
Cloud

Feb 27, 2026

Azure UK South Capacity: Key Facts and Preparation Guide

The Azure UK South region capacity constraints are impacting cloud deployments across the region—understanding the challenges and implementing proactive strategies ...

featured image for post: Deepfakes & Business Email Compromise: Securing Approvals in Microsoft

Feb 23, 2026

Deepfakes & Business Email Compromise: Securing Approvals in Microsoft

In this blog post, we’ll provide you with practical guidance on Microsoft-specific controls to protect approvals and payments in Microsoft 365 to protect you from ...

featured image for post: Top 10 Disaster Recovery Failures and Solutions
Backup & Recovery

Feb 19, 2026

Top 10 Disaster Recovery Failures and Solutions

In this post, we're addressing the ten most common reasons disaster recovery fails during an incident, including practical fixes you can implement without ...

featured image for post: Cloud Migration Assessment: Key Metrics and Planning
Digital Transformation

Feb 18, 2026

Cloud Migration Assessment: Key Metrics and Planning

In this post, we'll look at the eight things that decide whether migration is smooth or painfully ...

featured image for post: Lessons from Birmingham's Oracle ERP Failure

Feb 3, 2026

Lessons from Birmingham's Oracle ERP Failure

In this article, we reflect on the chaos and ballooning costs that ensued after ...

featured image for post: M365 Security 2026: What to Monitor to Stop AI Phishing
Cybersecurity

Feb 2, 2026

M365 Security 2026: What to Monitor to Stop AI Phishing

AI has made phishing faster, more convincing, and harder to spot. This guide shows what to monitor in Microsoft 365 and Entra ID, so you can detect account takeovers ...

featured image for post: Are We Resilient Yet? Metrics, Heatmaps and a Roadmap
Backup & Recovery

Jan 29, 2026

Are We Resilient Yet? Metrics, Heatmaps and a Roadmap

In this blog post, we'll address a simple, board-ready way to measure and communicate business continuity/disaster recovery ...

featured image for post: Beyond Firewall: Third-Party Risk, Testing, and Human Side of Recovery
Backup & Recovery

Jan 27, 2026

Beyond Firewall: Third-Party Risk, Testing, and Human Side of Recovery

Your biggest continuity risks sit with the cloud and suppliers you depend on, so this post shows how to pressure-test third parties, ...

featured image for post: Designing an IT Resilience Strategy
Backup & Recovery

Jan 22, 2026

Designing an IT Resilience Strategy

In this blog post, we're addressing why an effective disaster recovery strategy requires more than just backups.

featured image for post: Outage Prevention: Risk Landscape, RTO and RPO
Backup & Recovery

Jan 20, 2026

Outage Prevention: Risk Landscape, RTO and RPO

Outages are inevitable. In this post, we show you how to end the argument about uptime and instead demonstrate how to start defining the RTO and RPO targets ...

featured image for post: What Are Business Continuity and Disaster Recovery?
Backup & Recovery

Jan 15, 2026

What Are Business Continuity and Disaster Recovery?

  A patch rollout or cloud wobble can turn an IT hiccup into a customer-facing crisis. This article explains how business continuity and disaster ...

featured image for post: Azure Spending Optimisation Best Practices
Digital Transformation
Cloud

Jan 13, 2026

Azure Spending Optimisation Best Practices

Not sure where your Azure budget is going? This guide explains how manufacturers can pinpoint top cost drivers, right-size resources, and ...

featured image for post: Cloud Options in Manufacturing Context
Cloud

Jan 8, 2026

Cloud Options in Manufacturing Context

Modernising manufacturing IT is high-stakes. That's why we're addressing public, private, hybrid and multi-cloud options and how to choose the right fit without ...

featured image for post: 2025 Tech Lessons: Outages, AI, and Cyberattacks
Opinions

Dec 30, 2025

2025 Tech Lessons: Outages, AI, and Cyberattacks

Cloud outages, messy AI rollouts and record-breaking cyberattacks made 2025 a stress test for everything we’ve centralised in tech. In this post, we unpack what ...

featured image for post: Combating AI Fraud with AI Security Tools
Cybersecurity

Dec 16, 2025

Combating AI Fraud with AI Security Tools

Understanding the Rise of AI-Powered Fraud The digital landscape is continuously evolving, and with it, the sophistication of cyberthreats. AI-powered fraud ...

featured image for post: Microsoft 365 Advanced Threat Protection: Defender and Purview
Cybersecurity

Dec 11, 2025

Microsoft 365 Advanced Threat Protection: Defender and Purview

In this blog post, we'll compare the two suites and give you some guidance which could be right for you. Contents

featured image for post: Advanced Threat Protection for SMBs
Cybersecurity

Dec 9, 2025

Advanced Threat Protection for SMBs

Discover how cloud-based advanced threat protection for Microsoft 365 is transforming cybersecurity in your industry, safeguarding sensitive operations and ...

featured image for post: Stay Secure with a Managed Service Provider

Nov 24, 2025

Stay Secure with a Managed Service Provider

Table of Contents Alleviating the Burden on Your Internal IT Team

featured image for post: BYOD Security Risks: Emails on Personal Phones
Cybersecurity

Nov 17, 2025

BYOD Security Risks: Emails on Personal Phones

Table of Contents The Hidden Risks of Unmanaged Devices

featured image for post: Zero Trust: What It Means, And Why You Need It Now in Microsoft 365
Cybersecurity

Nov 10, 2025

Zero Trust: What It Means, And Why You Need It Now in Microsoft 365

Table of Contents The Evolution of Cybersecurity

featured image for post: Microsoft 365 Cloud Backup is Your Responsibility
Cybersecurity
Backup & Recovery

Nov 5, 2025

Microsoft 365 Cloud Backup is Your Responsibility

Table of Contents Understanding Shared Responsibility in Microsoft 365

featured image for post: Patching Best Practices for Windows, M365 & Third-Party Software
Cybersecurity

Oct 28, 2025

Patching Best Practices for Windows, M365 & Third-Party Software

While out-of-date software is one of the most common vulnerabilities and organisations, how to patch effectively and efficiently is an art in itself. Table of ...

featured image for post: Cybersecurity Incident? Here’s How to Respond Fast

Oct 20, 2025

Cybersecurity Incident? Here’s How to Respond Fast

The first 30 minutes after a cyber security incident are the most crucial - but how do you plan for that? The Importance of Speed in Detecting and ...

featured image for post: Staff: Your Biggest Cyber Risk or Best Defence?

Oct 13, 2025

Staff: Your Biggest Cyber Risk or Best Defence?

Unsafe passwords leaving the doors wide open are only a part of what makes a cybersecurity risk in the modern world. Add phishing emails, calls and the urgency of the ...

featured image for post: Microsoft 365 Misconfigurations: Your Real Security Risk

Oct 6, 2025

Microsoft 365 Misconfigurations: Your Real Security Risk

Have you made sure that your Microsoft 365 security setup keeps hackers out? Table of Contents

featured image for post: Secure Microsoft 365 Before a Cyber Breach Occurs
Cybersecurity

Sep 29, 2025

Secure Microsoft 365 Before a Cyber Breach Occurs

Table of Contents The Rising Tide of Cyber Breaches: A Look at the Numbers

featured image for post: Windows 10 & Office 2016/2019 Support Ends October 2025
Product Info

Aug 28, 2025

Windows 10 & Office 2016/2019 Support Ends October 2025

The Clock Is Ticking Is it the end for Windows 10? Officially yes, but you can in fact still receive security updates (although only critical ones) until 10 ...

featured image for post: A Step-by-Step Cloud Migration Planning Guide

Jul 25, 2025

A Step-by-Step Cloud Migration Planning Guide

Understanding the Business Objectives of Cloud Migration When planning a cloud migration, you need to have a clear understanding of your ...

featured image for post: Microsoft Security Copilot: Benefits & Overview

Jul 18, 2025

Microsoft Security Copilot: Benefits & Overview

What Is the Difference Between Microsoft Copilot and Microsoft Security Copilot? While Microsoft Copilot often comes up in conversation in ...

featured image for post: What is Azure Virtual Desktop and Why Use It?

Jul 10, 2025

What is Azure Virtual Desktop and Why Use It?

Virtual desktops essentially allow you to ‘use’ your personal desktop from any device. In Microsoft’s case, this solution is called Azure Virtual Desktop (AVD), named ...

featured image for post: Master Cloud API Monitoring for Better UX

Jul 3, 2025

Master Cloud API Monitoring for Better UX

Understanding the Importance of Cloud API Monitoring Cloud API monitoring plays a crucial role in ensuring the smooth functioning of applications and ...

featured image for post: Protecting Identities in the AI Era

Jun 27, 2025

Protecting Identities in the AI Era

In this article, we will investigate strategies on how to protect and manage identities in your organisation in a world of increasingly smarter cyber criminals. ...

featured image for post: The Future of Cyber Defense with AI-Driven Security

Jan 10, 2025

The Future of Cyber Defense with AI-Driven Security

As cyber threats grow more sophisticated, AI-driven security is emerging as the linchpin of modern cyber defence strategies. The Evolution of ...

featured image for post: Managed vs. Unmanaged Cloud: Which is Right for You?

Aug 6, 2024

Managed vs. Unmanaged Cloud: Which is Right for You?

Explore the pivotal differences between managed and unmanaged cloud services to determine the best fit for your business's unique ...

featured image for post: AI Power: 2024 Business Trends

Jun 11, 2024

AI Power: 2024 Business Trends

Discover how AI is shaping the future of businesses and the top trends to watch out for in 2024. AI Integration in Customer Service AI ...

featured image for post: Cloud Spending Optimization: A Comprehensive Guide

Jun 11, 2024

Cloud Spending Optimization: A Comprehensive Guide

Learn how to effectively manage and optimize your cloud spending to maximize cost efficiency and business performance. Understanding Cloud Cost ...

featured image for post: Why You Need Sequence Diagrams

Jun 10, 2024

Why You Need Sequence Diagrams

Discover the importance and benefits of using sequence diagrams in the world of DevOps. Understanding Sequence Diagrams Sequence diagrams are ...

featured image for post: Still Running VMware? Time to Migrate

May 15, 2024

Still Running VMware? Time to Migrate

Discover the benefits of migrating from VMWare and why it's time to make the switch to a more advanced solution. The drawbacks of sticking with ...

featured image for post: Master Vulnerability Management for Cybersecurity

May 15, 2024

Master Vulnerability Management for Cybersecurity

Discover the essential strategies for effective vulnerability management in cybersecurity to protect your organization from cyber threats. ...

featured image for post: Phi-3: Redefining What's Possible With SLMs

Apr 24, 2024

Phi-3: Redefining What's Possible With SLMs

Explore how the new Phi-3 is revolutionizing the world of SLMs and pushing the boundaries of what's possible. The Evolution of SLMs SLMs ...

featured image for post: Future of AI in UK Business: What to Expect

Mar 18, 2024

Future of AI in UK Business: What to Expect

Explore the evolving landscape of AI in the UK business sector and the potential implications for companies. Understanding AI Adoption in UK ...

featured image for post: Microsoft Research Releases Orca 2 LLM

Nov 28, 2023

Microsoft Research Releases Orca 2 LLM

Discover how large language models are revolutionizing AI research and unlocking new possibilities. The Evolution of Language Models Language ...

featured image for post: What is Azure OpenAI? Enterprise AI Explained

Oct 3, 2023

What is Azure OpenAI? Enterprise AI Explained

What is Azure OpenAI Service?

featured image for post: Microsoft 365 Copilot: Your AI Assistant for Work

Oct 2, 2023

Microsoft 365 Copilot: Your AI Assistant for Work

Microsoft are bringing the power of next-generation AI to work. Introducing Microsoft 365 Copilot — your copilot for work. It ...

featured image for post: Windows 11 23H2 Arrives for Release Preview Insiders

Sep 27, 2023

Windows 11 23H2 Arrives for Release Preview Insiders

"Today we are making Windows 11, version 23H2 Build 22631 (Windows 11 2023 Update) available in the Release Preview Channel for Windows Insider Program for Business ...

featured image for post: September Patch Tuesday: 61 New CVEs Released

Sep 26, 2023

September Patch Tuesday: 61 New CVEs Released

September 2023 Key Vulnerabilities CVE-2023-38149 Windows TCP/IP Denial of Service Vulnerability – [Important] This vulnerability, tagged with a base score ...

featured image for post: Microsoft Copilot arrives in Windows 11 22H2 update

Sep 26, 2023

Microsoft Copilot arrives in Windows 11 22H2 update

Copilot allows users to utilize natural language to ask it to carry out particular tasks or help with troubleshooting, like adjusting Windows ...

featured image for post: Innovating with Scalability and Flexibility on Azure

Jul 18, 2023

Innovating with Scalability and Flexibility on Azure

Here are some ways innovation can help organisations take their scalability and flexibility to the next level.

featured image for post: The Power of Innovation with Azure FinOps

Jul 17, 2023

The Power of Innovation with Azure FinOps

But how can organisations stay ahead of the game in Azure FinOps? Through innovation. Innovation is key to staying ahead in any field, and Azure FinOps is no ...

featured image for post: Unlock Azure High-Performance Computing with Innovate

Jul 14, 2023

Unlock Azure High-Performance Computing with Innovate

That’s where Microsoft Azure comes in – a cloud-based platform that offers powerful HPC capabilities to organisations of all sizes. But how can organisations stay ...

featured image for post: How to Use Innovate for Superior Azure Monitoring & Analytics

Jul 13, 2023

How to Use Innovate for Superior Azure Monitoring & Analytics

Innovation is the key to unlocking new capabilities, improving performance, and optimising costs. Here are some ways innovation can help organisations take their ...

featured image for post: Save on Costs with Azure Spot Instances

Jul 12, 2023

Save on Costs with Azure Spot Instances

Key Benefits Cost savings: Azure Spot pricing can ...

featured image for post: Build Cloud-Native Apps with Azure

Jul 11, 2023

Build Cloud-Native Apps with Azure

With Azure, Microsoft’s cloud computing platform, developers have access to a wide range of tools and services that make it easy to build, deploy and manage ...

featured image for post: Advanced Azure Security Through Innovation

Jul 10, 2023

Advanced Azure Security Through Innovation

Here are some ways innovation can help organisations achieve advanced security ...

featured image for post: Teams Bug Exploits: Malware Sent to Users via New Tool

Jul 7, 2023

Teams Bug Exploits: Malware Sent to Users via New Tool

When TeamsPhisher is activated, it leverages an existing vulnerability in Microsoft Teams that allows for file uploads without any authentication or authorisation. ...

featured image for post: Improve Azure Performance and Functionality

Jul 7, 2023

Improve Azure Performance and Functionality

Building cloud-native applications with Azure is a powerful way to take advantage of the benefits of the cloud. By using Azure’s tools and services, developers can ...

featured image for post: Simplify Your Multicloud Deployments

Jul 6, 2023

Simplify Your Multicloud Deployments

To help simplify the process, organisations should develop a comprehensive understanding of their requirements before selecting their cloud provider. This includes ...

featured image for post: Apple, Google, and MOVEit Patch Serious Security Flaws

Jul 5, 2023

Apple, Google, and MOVEit Patch Serious Security Flaws

The vulnerability was discovered by Google's Project Zero researchers and is believed to affect all versions of iOS up to iOS version 14.3 as well as older versions ...

featured image for post: 99% of firms struggle with multiple cloud platforms

Jul 4, 2023

99% of firms struggle with multiple cloud platforms

According to the survey respondents, data complexity is one of the biggest issues they deal with when using multiple clouds. Many businesses are struggling to find a ...

featured image for post: 70% of tech infrastructure will be cloud-based in 3 years

Jul 3, 2023

70% of tech infrastructure will be cloud-based in 3 years

Cloud computing has become an increasingly popular choice for businesses, due to its scalability and cost-effectiveness. By moving their processes to the cloud, ...

featured image for post: VMware Warns of Critical vRealize Flaw Under Attack

Jun 23, 2023

VMware Warns of Critical vRealize Flaw Under Attack

Security researchers from GreyNoise were the first to issue a warning about the vulnerability one week after its patch, and two days later technical details were ...

featured image for post: Windows 365 Exposes Azure Credentials in Plaintext

Jun 23, 2023

Windows 365 Exposes Azure Credentials in Plaintext

The vulnerable feature is included in Windows 365’s Enterprise Mobility + Security (EMS) suite. EMS is designed to provide secure access for users to corporate ...

featured image for post: Microsoft Patches Azure AD Authentication Flaw

Jun 22, 2023

Microsoft Patches Azure AD Authentication Flaw

The issue, which was discovered by security researchers from CyberArk Labs, affects organisations using Azure AD Connect, the cloud-based identity and access ...

featured image for post: June 2023 Patch Tuesday: 78 Flaws and 38 RCE Bugs Fixed

Jun 15, 2023

June 2023 Patch Tuesday: 78 Flaws and 38 RCE Bugs Fixed

The highest severity bug patched this month is a critical RCE vulnerability found in the Microsoft Video Control component of Windows Server. The flaw can be ...

featured image for post: January Patch Tuesday: Nearly 100 Vulnerabilities

Apr 13, 2023

January Patch Tuesday: Nearly 100 Vulnerabilities

IT and security teams should prioritize CVE-2023-21674, an important and actively exploited zero-day vulnerability in Windows ...

featured image for post: April Security Update: 101 Vulnerabilities Fixed

Apr 13, 2023

April Security Update: 101 Vulnerabilities Fixed

Microsoft's April 2023 Patch Tuesday, and security updates fix one actively exploited zero-day vulnerability and a total of 97 ...

featured image for post: March Patch Tuesday: Two New Zero-Days Released

Apr 5, 2023

March Patch Tuesday: Two New Zero-Days Released

CVE-2023-23397 – Microsoft Outlook Elevation of Privilege Vulnerability [CRITICAL ZERO-DAY] CVE-20223-23397 is an actively exploited zero-day vulnerability ...