Marc Walker

  • Home
  • Author: Marc Walker
Help with IT Nightmares - Commstec IT

Don’t Let Cybersecurity Threats Haunt Your Business This Halloween

In the eerie realm of today’s digital age, businesses find themselves entangled in more than just traditional challenges. Amidst the dark corners of the online world, sinister cybersecurity threats patiently await their moment to strike. To safeguard your business from these concealed horrors, you must first recognise the shadowy adversaries that lurk in the digital […]
Read More
Cutting IT Costs

How to Cut IT Costs: 5 Proven Strategies

In today’s business landscape, managing IT expenses efficiently is critical for organisations of all sizes. The good news is that there are several proven strategies that can help you cut IT costs without compromising the quality of your services. In this blog post, we’ll explore five strategies that can make a significant impact on your […]
Read More
Identity-Management

Why Identity & Access Management is a Key Part of Cybersecurity

In today’s digital landscape, cybersecurity stands as a paramount concern for both businesses and individuals. The ever-present threat of cyberattacks, including data breaches and malware incursions, can result in substantial financial losses. These attacks originate from diverse vectors, including the everyday cloud tools we rely on. The average employee now engages with a staggering 36 […]
Read More

Technologies To Help Your Small Business Run Better

Running a small business can be challenging, but advancements in technology have opened a world of opportunities. Small business owners can use digital tools to streamline operations, as well as improve efficiency and boost productivity. From innovative software to cutting-edge hardware, there are a lot of tools to choose from. The right technology can help […]
Read More

What is Zero-Click Malware? How Do You Fight It?

What is Zero-Click Malware? How Do You Fight It? In today’s increasingly connected landscape, cybersecurity threats continue to evolve. They pose significant risks to individuals and organisations alike, and one such threat gaining prominence is zero-click malware. This insidious form of malware requires no user interaction and can silently compromise devices and networks. One example […]
Read More

Adopting a Defence-in-Depth Cybersecurity Strategy

Advantages of Adopting a Defence-in-Depth Cybersecurity Strategy Cybersecurity threats are becoming increasingly sophisticated and prevalent. In 2022, ransomware attacks jumped by 93%. The introduction of ChatGPT will only increase the potential damage of cyber-attacks. Protecting sensitive data and systems requires a comprehensive approach that goes well beyond a single security solution. This is where a […]
Read More

Vulnerability Management: Your 6 Step Protection Process

Vulnerability management is something all businesses need to consider within their IT strategy, but the majority don’t. When software companies push new updates, there are often weaknesses in the code that hackers can find and exploit. Software makers then address the vulnerabilities with a security patch. This cycle continues with each new software or hardware update that is released. […]
Read More

Cyber Security for Small Business: The need to take the threat seriously

In this article we will explain why cyber security for small business is a topic being talked about more and more. Recent headlines have highlighted a surge in cyberattacks against prominent public-facing companies. On January 10th, 2023, Royal Mail fell victim to a LockBit ransomware attack that compromised its systems. Towards the end of the […]
Read More
IT Consultancy Sheffield

Align Your Team to Company Targets with Microsoft Viva Goals

Align Your Team to Company Targets with Microsoft Viva Goals You often hear the words “digital transformation” and “collaboration.” But what do they actually mean? What do they mean for the day-to-day of running your business? Collaboration can’t happen without shared goals. When departments are siloed and unconnected, priorities can conflict. People are doing their […]
Read More
Network Services

5 Ways to Balance User Productivity with Solid Authentication Protocols

5 Ways to Balance User Productivity with Solid Authentication Protocols One constant struggle in the workplace today, is the balance between productivity and security. If you give end users too much freedom in your network, the risk increases. But adding too many security gates and hoops to jump through, and productivity can dwindle. It’s a […]
Read More