All
  • All
  • Virtualisation Connectivity
  • Veeam
  • Uncategorized
  • TIM-Blog
  • Support & Maintenance
  • Storage
  • Managed IT
  • HPE
  • HIM - Videos
  • HIM - Blog
  • General
  • Cyber
  • Cloud
  • Case Studies
  • Blogs
  • Backup Archive Data Recovery

Don’t Get Caught in the Cyber Insurance Gap!

Cyber insurance isn’t your safety net. Learn why compliance isn’t coverage, how exclusions are expanding, and the proactive security steps needed to bridge the cyber insurance gap.

Read More
Red keyboard key surrounded by many floating padlock icons, symbolising security and vulnerability in pen testing.

What Happens When You Press The Big Red Button In A Penetration Testing Programme?

‘Big red buttons’ are both terrifyingly ominous and mysteriously inviting. They can also be confusing – do you press it or do you not? Just ask Father Dougal from the 1990s sitcom Father Ted – and see how that sticky dilemma turned out for him. In this scenario, the big red button sits on your desk, right now, metaphorically speaking at least. Pressing it will trigger something powerful – a controlled, simulated cyber attack test.

Read More
Visual representation of global data protection and disaster recovery, showing connected networks and a digital world map held in human hands.

Why Getting RTO And RPO Wrong Can Cost You More Than Just Data

The two most important acronyms in operational resilience are RTO and RPO. Recovery Time Objective (RTO) and Recovery Point Objective (RPO), taken together, form the backbone of any disaster recovery and continuity strategy. However, many businesses miscalculate these critical parameters, leading to vulnerabilities far beyond mere data loss. Poorly defined RTOs and RPOs can erode customer trust, inflict financial damage, and even push businesses into regulatory hot water.

Read More
Digital shield icon surrounded by binary code representing secure data isolation and cyber vault protection for enhanced cyber resilience and disaster recovery.

How Cyber Vaults Strengthen Your Data Recovery & Protection Strategy

Data recovery and protection have never been more critical. With a growing list of threats including ransomware, accidental data corruption, and insider risks, businesses now face a range of challenges that can severely disrupt their operations. Traditional data security measures, such as operational backups or mirrored systems, while still essential, are no longer always sufficient to provide ironclad protection against sophisticated attacks or unforeseen failures.

Read More
IT professional using digital analytics to manage cloud-based disaster recovery, illustrating how cloud solutions enhance business resilience and data protection.

How Cloud-Based Disaster Recovery Strengthens Your IT Resilience

For IT managers tasked with protecting their organisations against unexpected disruptions and system failures, cloud-based disaster recovery (DR) provides a robust and reliable defence against a range of threats. By shifting disaster recovery to the cloud, organisations can achieve greater resilience, avoid the costs and limitations of cumbersome on-premises systems, and better align with today’s fast-evolving IT needs.

Read More
HPE Discover 2025 event entrance showcasing the HPE logo and GreenLake displays, highlighting themes of AI, cyber resilience, and hybrid cloud infrastructure.

What We Learned At HPE Discover 2025

Robert Townsend and I have just got back from HPE Discover in Las Vegas, and I wanted…

Read More