365labs Blog

Grab a Coffee

 
IT Manager, Outsource, or why not both?
Paul Barton Paul Barton

IT Manager, Outsource, or why not both?

As a business owner, you're always looking for ways to improve your company's efficiency and productivity. One area that you may be considering is your IT department. Should you hire an IT manager to oversee all technology-related tasks, or should you outsource the work to an external company? In this blog post, we will discuss the pros and cons of each option and explore why combining the two may be the best choice for your business.

Read More
When to Consider SaaS, PaaS, or IaaS for Small Business Web Hosting
Chloë Hall Chloë Hall

When to Consider SaaS, PaaS, or IaaS for Small Business Web Hosting

When it comes to hosting a website for a small business, there are several options available. Three popular options are Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), or Infrastructure-as-a-Service (IaaS). Each of these options has its advantages and disadvantages, and choosing the right one can be challenging. This blog post will explore when a small business should consider SaaS, PaaS, or IaaS for web hosting, with a focus on simplicity and usability.

Read More
The Artificial Intelligence Arms Race
AI Aria Iverson AI Aria Iverson

The Artificial Intelligence Arms Race

The AI arms race has emerged as one of the most critical global issues of the 21st century. As nations compete to develop increasingly advanced AI technologies, the potential for a technological arms race has become a pressing concern.

Read More
3cx and supply chain attacks
Paul Barton Paul Barton

3cx and supply chain attacks

In recent years, supply chain attacks have become an increasingly prevalent and concerning issue for businesses and individuals alike. A supply chain attack is a type of cyber attack that targets a company's or organization's supply chain, which is the network of businesses and individuals that contribute to the creation and delivery of a product or service.

Read More
For the attention of the Board
Chloë Hall Chloë Hall

For the attention of the Board

Cybersecurity breaches can lead to significant financial losses, legal liabilities, and reputational damage. It is therefore crucial for board members to take a pivotal role in cybersecurity and cyber resilience. In this article, we will discuss why board members must take responsibility for cybersecurity and what steps they can take to ensure their organizations are protected.

Read More
What are Microsoft 365 Copilot and Microsoft Security Copilot?
Ewan Hobbs Ewan Hobbs

What are Microsoft 365 Copilot and Microsoft Security Copilot?

Microsoft 365 Copilot is a new AI assistant that uses machine learning to help users improve their productivity in a variety of ways. Copilot is available across Microsoft 365 apps and services, making it a powerful tool for users who want to get more out of their workday. So, what exactly is Microsoft 365 Copilot,

Read More
The General Data Protection Regulation (GDPR)
Aimie McCabe Aimie McCabe

The General Data Protection Regulation (GDPR)

The General Data Protection Regulation (GDPR) is a regulation enacted by the European Union (EU) in May 2018 that governs the processing and storage of the personal data of EU residents. The GDPR aims to provide individuals with greater control over their personal data and to establish a harmonized data protection framework across the EU.

Read More
Supply chain attacks
Chloë Hall Chloë Hall

Supply chain attacks

Cybersecurity threats are constantly evolving, and supply chain attacks are becoming an increasingly common method for hackers to gain access to sensitive information.

Read More
How not to redact
Chloë Hall Chloë Hall

How not to redact

Redacting information is a crucial step in keeping sensitive data secure. It involves removing or obscuring sensitive information from documents, images, or any other type of content. However, redaction mistakes can lead to data breaches, which can have serious consequences.

Read More
What is ransomware?
Aimie McCabe Aimie McCabe

What is ransomware?

Ransomware attacks can have devastating consequences for individuals and organizations, as they can result in the loss of sensitive information and significant downtime. To protect against ransomware attacks, it's important to regularly backup data, keep software and security systems up-to-date, and educate employees on safe cybersecurity practices.

Read More
Weak passwords
Chloë Hall Chloë Hall

Weak passwords

A weak password is any password that is easily guessable or can be cracked using automated tools.

Read More
Have I been pwned?
Paul Barton Paul Barton

Have I been pwned?

Have I Been Pwned is a free resource that allows individuals to check if their personal data has been compromised in a breach. HIBP collects and aggregates data from various sources, including data breaches and pastes, to provide a comprehensive database of breaches.

Read More
Are password managers safe?
Paul Barton Paul Barton

Are password managers safe?

A computer program and/or cloud service that stores and manages a user’s or company’s secrets - are they safe?

Read More