All
  • All
  • Virtualisation Connectivity
  • Veeam
  • Uncategorized
  • TIM-Blog
  • Support & Maintenance
  • Storage
  • Managed IT
  • HPE
  • HIM - Videos
  • HIM - Blog
  • General
  • Cyber
  • Cloud
  • Case Studies
  • Blogs
  • Backup Archive Data Recovery
Red keyboard key surrounded by many floating padlock icons, symbolising security and vulnerability in pen testing.

What Happens When You Press The Big Red Button In A Penetration Testing Programme?

‘Big red buttons’ are both terrifyingly ominous and mysteriously inviting. They can also be confusing – do you press it or do you not? Just ask Father Dougal from the 1990s sitcom Father Ted – and see how that sticky dilemma turned out for him. In this scenario, the big red button sits on your desk, right now, metaphorically speaking at least. Pressing it will trigger something powerful – a controlled, simulated cyber attack test.

Read More
Visual representation of global data protection and disaster recovery, showing connected networks and a digital world map held in human hands.

Why Getting RTO And RPO Wrong Can Cost You More Than Just Data

The two most important acronyms in operational resilience are RTO and RPO. Recovery Time Objective (RTO) and Recovery Point Objective (RPO), taken together, form the backbone of any disaster recovery and continuity strategy. However, many businesses miscalculate these critical parameters, leading to vulnerabilities far beyond mere data loss. Poorly defined RTOs and RPOs can erode customer trust, inflict financial damage, and even push businesses into regulatory hot water.

Read More
Digital shield icon surrounded by binary code representing secure data isolation and cyber vault protection for enhanced cyber resilience and disaster recovery.

How Cyber Vaults Strengthen Your Data Recovery & Protection Strategy

Data recovery and protection have never been more critical. With a growing list of threats including ransomware, accidental data corruption, and insider risks, businesses now face a range of challenges that can severely disrupt their operations. Traditional data security measures, such as operational backups or mirrored systems, while still essential, are no longer always sufficient to provide ironclad protection against sophisticated attacks or unforeseen failures.

Read More
IT professional using digital analytics to manage cloud-based disaster recovery, illustrating how cloud solutions enhance business resilience and data protection.

How Cloud-Based Disaster Recovery Strengthens Your IT Resilience

For IT managers tasked with protecting their organisations against unexpected disruptions and system failures, cloud-based disaster recovery (DR) provides a robust and reliable defence against a range of threats. By shifting disaster recovery to the cloud, organisations can achieve greater resilience, avoid the costs and limitations of cumbersome on-premises systems, and better align with today’s fast-evolving IT needs.

Read More
HPE Discover 2025 event entrance showcasing the HPE logo and GreenLake displays, highlighting themes of AI, cyber resilience, and hybrid cloud infrastructure.

What We Learned At HPE Discover 2025

Robert Townsend and I have just got back from HPE Discover in Las Vegas, and I wanted…

Read More
A row of stylised cloud icons receding into the distance, connected by glowing blue lines on a dark blue and black background, illustrating the concept of hybrid working data protection with HPE Hybrid Storage solutions.

Hybrid Working: How HPE Hybrid Cloud Solutions Safeguard Your Information

The rise of hybrid working has redefined how and where business data is accessed. With employees operating across multiple devices and locations, the traditional model of securing a centralised office network is no longer sufficient.

Read More