+44 (0)203 9257 909
customerservices@hayachi.com

Implementing a Terminal Server with Linux Mint

Implementing a Terminal Server with Linux Mint

Implementing a Terminal Server with Linux A Terminal Server is a server which is designed to be remotely accessed, in the same way you can run a virtualised Remote Desktop to enable access to your network or a particular application. It is a very convenient way to enable internal or external users to access services in a secure way. Some guidance: Any Endpoint on your system must be secured, including servers Yes you save money on licenses through a Linux

Read More

Open Source Intelligence and Communities

What is Open Source Intelligence? Open Source Intelligence (OSINT) is not particular to IT Security and instead is a much broader concept – it is about the free flow and analysis of information from a wide variety of sources. Many intelligence communities including British Intelligence are increasingly using OSINT to expand their capabilities. The open-source element can be software or community, for example it can be the toolset an IT Security vendor uses to support businesses of all sizes, or

Read More

The Conversation, on Ethics and AI

We invited an AI to debate its own ethics in the Oxford Union – what it said was startling ‘51 million wiki pages down, 3 million to go …’ Allies Interactive Dr Alex Connock, University of Oxford and Professor Andrew Stephen, University of Oxford Not a day passes without a fascinating snippet on the ethical challenges created by “black box” artificial intelligence systems. These use machine learning to figure out patterns within data and make decisions – often without a human giving

Read More

Why is Digital Transformation more than just tech?

Is Digital Transformation more than just tech? Digital Transformation is simply more than technological advance – the right technology with the wrong process or culture will still fail. This cultural oversight is why more than 70% of all digital transformation programmes fail. Failure is defined as providing no business value, i.e. the project was simply an expense with no material return on investment. This is a shockingly high number and an unaffordable cost for SMEs who often work in very

Read More

Making the most of Hybrid Working

Defining Hybrid Working Hybrid Working is treated as the best of both worlds between working in a ‘traditional’ office environment and working at home, or in leased premises. Some organisations refer to this as Work From Anywhere, or Agile Working. In practice this has its own technical challenges but the main issue firms may face when adopting Hybrid Working will be cultural – is the organisation ready to accommodate the fact that staff may be working in a setting where

Read More

IT Security for Small Business

IT Security for Small Business Small Business are not resistant to shocks, the Federation of Small Business advise that every year 50,000 small businesses close due to late payments but there are other threats that can result in not even being able to manage payments or cashflow. IT Security for Small Business will always be a challenge as SMEs need to balance the risks of a cyberattack with things like late payment. Cash in the bank is central to any business,

Read More

Sustaining Network Security

Network Security – Making IT work Sustaining Network Security is fundamental to protecting your business. Many organisations will purchase a Firewall but fail to regularly patch (that is, update) their systems and this in turn creates vulnerabilities that cyber-criminals take advantage of. Many smaller businesses and charities naturally cannot afford annual penetration tests and monthly review of their IT Estates in order to confirm that everything is functional. This is despite 33% of new malware (Malicious Software) being file-less, and

Read More

Good Information Security

What is good Information Security? Information Security is a very broad term, it accounts for the security of any information system that an organisation uses – ranging from smoke-signals to quantum computers. Good information security is flexible and works to classify information so that you can satisfy particular security requirements – such as data integrity over a secure line. This is best demonstrated by how governments classify information and how to treat it. To follow on from the example of

Read More

The Cost of Downtime

The Significant Cost of Downtime Any business owner who has experienced system downtime knows that it costs money, ruins the flow of your business operation during that period and altogether removes your mo-jo. Downtime has real monetary costs, be it a failure to prevent ransomware or a infrastructure failing to run a service that is critical for your teams to function. When it comes to avoiding downtime there is only one thing which can really help: effective planning. If your

Read More

Security first: why good enough isn’t good enough anymore

The Computer Security challenge Most solutions require an internet connection and are therein contactable through the internet – be this an internal network (such as within the office) or an external one (through the world-wide-web) such as a web-interface. This is why since 2020 ransomware has become increasingly dangerous for the global economy, from small and medium sized businesses to government departments or critical infrastructure. Their systems are always ‘online’ and so make juicy targets. The requirement for an organisation

Read More
Categories
IT Ninjas Communicate

Need an IT ninja?

+44 (0)203 9257 909

customerservices@hayachi.com

customerservices @hayachi.com