Get to Know… Simon Koscinski

Simon Koscinski is the founder and managing director of Advatek. Get to know him here… How long have you worked in the IT industry? A solid 19 Years – not sure where all that time has gone. How long have you been running Advatek? I have been at the helm of Advatek for 11 Years

Get to Know… Mat John

Mat John recently started as Technical Account Manager for the Midlands, get to know him in our Q&A here… How long have you worked in the IT industry ? I’ve spent 15 years in the IT Industry, previous to this I worked as a multiskilled Maintenance engineer (electrical biased) fixing plant machinery which I moved

Cardiff Met

New Case Study: Cardiff Metropolitan University

Established in 1865, Cardiff Metropolitan University’s education, research, and innovation programmes attract people from around the globe. They bring together students, governments, and industry to create tangible benefits for individuals, society and the economy. The Challenge The relentless growth of virtual learning and the digital economy drives universities to continually review the security of their

Indicators of Compromise Service

Already a FortiAnalyzer user?  You should consider the Indicators of Compromise subscription from Fortinet: Indicators of compromise (IOCs) are artifacts observed on a network or in an operations system where we have a high confidence that said artifact indicates a computer intrusion. FortiGuard’s IOC service helps security analysts identify risky devices and users based on

FortiOS 6.0: FortiGuard content disarm and reconstruction

Some interesting info here on some of the new features in FortiOS 6.0 – Content Disarm and Reconstruction. Content Disarm and Reconstruction (CDR) removes exploitable content and replaces it with content that’s known to be safe. As files are processed through an enabled AntiVirus profile, content that’s found to be malicious or unsafe is replaced with content that allows the traffic to continue, but

SVC Awards 2018

IT Security Project of the Year

We’re absolutely delighted to announce that last Thursday, at the SVC awards, we won the award for IT Security Project of the Year! A very special thank you to all that voted for us at the awards! The award was based on an internal segmentation and perimeter security project which also included a business continuity

The NHS Needs a Security Transformation

The NHS is in a unique and particularly vulnerable position when it comes to cybersecurity due to the level of regulation and compliance surrounding patient privacy and data protection. At the same time, it is a preferred target for the hacker or cybercriminal due to the high residual value of a NHS record. However, cyber-attacks

NHS Cyber Assessment

Cyber Threat Assessment for the NHS

In order to improve on the overall healthcare experience, the NHS is increasingly relying on the use of technology to manage patient data. However, without robust processes and adequate IT systems, information integrity is at risk of being compromised by unauthorised parties. By rendering patient data inaccessible or public, these data breaches can adversely affect