fbpx
hands turning a dial to select the words white list

What is Application Whitelisting?

Application Whitelisting is a higher end method of showing zero trust to your machines operating system, data, users and environment. This is achieved by allowing only the applications that we permit to run on a device, meaning unwanted applications cannot be installed and even better, malicious code is unable to run, as well as non-work-related applications. It acts as another line of defence against viruses, malware, ransomware and more.

woman in striped jumper on laptop working from home

How Can an IT Support Company Help If Your Staff Work Remotely 

With the rise of remote work, businesses are facing new challenges in ensuring the productivity and security of their employees. IT support for remote staff is essential in addressing these challenges and keeping the company running smoothly. In this blog, we will explore the impact of IT support for remote employees, including common challenges faced by remote workers and the top ways IT support companies can assist in overcoming them.

Technician using computer in front of server racks

Introducing Our New Cyber-Defence Department

Lockdown has seen the threat of cybercrime increase significantly. More of your team are working from more locations, sharing more data, and connecting from more devices, and using more remote access tools. Hackers are very aware of this and they know that all these new technologies and working methods leave your staff more vulnerable to phishing and social engineering attempts than ever before. 

man's hand using laptop with padlock on top of it

Azure Active Directory – Your Questions Answered

Microsoft Azure is one of the largest cloud platforms in the world. Many businesses are taking advantage of cloud technologies to increase their efficiency and security. One of the ways businesses are doing this is by using cloud solutions like Azure Active Directory.

The cloud-based Azure Active Directory is replacing on-premises Active Directory. Let’s take a look at why businesses use Azure Active Directory. You’ll see how it works and how a Microsoft-certified managed Azure services provider like Carden IT can help.

Carden IT Group Cyber Essentials Certificate

Cyber Essentials Certification – Your Questions Answered

In 2014 the UK government launched the Cyber Essentials scheme. This is a certification which asserts that companies who have qualified for Cyber Essentials are meeting the minimum required standards to be considered cyber secure.

There is absolutely no doubt that number and frequency of cyber-attacks is on the rise, and fast. With a Cyber Essentials certification, you can rest assured that you have completed all the recommended steps to offset the risk of a cyber-attack on your business.

cartoon hands using a mobile phone with security logos above

Microsoft Office 365 Multi Factor Authentication – Your Questions Answered

Multi Factor Authenticator (MFA), sometimes referred to as 2 Factor Authentication (2FA), is a method of providing different forms of authentication methods towards a service, usually an online public facing one. You may however also find these on internal systems. Enabling MFA on your Office 365 tenant is a must, and you should do this TODAY.