Your Local Managed IT Support and Software Development Partner across North East England

Questions? Call Us!

0191 662 0100

In The Know

Our Blog

Clean Desk 2.0: Securing Your Home Office from Physical Data Leaks

Clean Desk 2.0: Securing Your Home Office from Physical Data Leaks

Imagine someone sitting at your desk while you’ve just nipped off for a coffee. They don’t need to be a master hacker if your screen is already unlocked. An unattended session is like leaving your fro... ...more

Cyber Security ,Data &Hybrid Working

April 21, 20265 min read

The "Backup Exit" Strategy: Can You Move Your Data Without the Vendor’s Help?

The "Backup Exit" Strategy: Can You Move Your Data Without the Vendor’s Help?

A lot of businesses run into trouble when they try to move on from a backup provider. They often find their data is stuck in proprietary formats or that they need to pay for pricey migration support j... ...more

Data ,Cloud

April 20, 20264 min read

The "Session Cookie" Hijack: Why MFA Can’t Always Save You

The "Session Cookie" Hijack: Why MFA Can’t Always Save You

Multi-factor authentication is a strong front-door lock, but it is not the only thing that decides whether someone can get into your accounts. After you sign in, your browser keeps you logged in using... ...more

Cyber Security ,Cloud

April 20, 20265 min read

The "Legacy Debt" Audit: Identifying the 3 Oldest Risks in Your Server Room

The "Legacy Debt" Audit: Identifying the 3 Oldest Risks in Your Server Room

Aging hardware can be the most dangerous thing in a server room. It represents legacy debt, which is not just old tech, but old tech that has become a dependency. This debt silently accumulates risk u... ...more

Technology ,Hardware

April 17, 20264 min read

A Small Business Roadmap for Implementing Zero-Trust Architecture

A Small Business Roadmap for Implementing Zero-Trust Architecture

Most small businesses aren’t breached because they have no security. They’re breached because one stolen password becomes a master key. That’s the flaw in the old perimeter model. Once someone gets in... ...more

Cyber Security

March 27, 20265 min read

New Blog Stop Ransomware in Its Tracks: A 5-Step Proactive Defence PlanPost

New Blog Stop Ransomware in Its Tracks: A 5-Step Proactive Defence PlanPost

Ransomware doesn’t start with encryption. It starts with access. A stolen password. An unpatched system. An admin account with too much reach. In this article, we’ll walk through a five-step ransomwar... ...more

Cyber Security

March 27, 20264 min read

Get In Touch

0191 662 0100

Room 2, Henson House
Planet Place, Stephenson Industrial Estate
Newcastle upon Tyne

NE12 6RZ

Newsletter

Click the button below to subscribe to "In the Know" our monthly News Letter to keep up to date with technology and security tips.


Copyright 2023 | Compusolve IT Solutions Ltd

Registered in Engalnd No. 08667768. Registered Office: The Old Post Office, 63 Saville Street, North Shields, NE30 1AY

Privacy and Cookie Policy | Terms and Conditions