![](https://images.squarespace-cdn.com/content/v1/64df0e9653894b1a9474b073/1700213329758-8Y8BD9OJER8VMB1P45G6/image-asset.jpeg)
Blog
A collection of thought-provoking articles written by our team on technology, cybersecurity and business leadership.
![The problem with Microsoft Authenticator](https://images.squarespace-cdn.com/content/v1/64df0e9653894b1a9474b073/1722732988860-6F3CLXSFCAHDQW85VF10/Microsoft_logo_on_an_iphone_with_a_cracked_screen_f729c7d2-0d37-4e39-a1a5-160175bb72fa.png)
![Firewalls are no panacea for cybersecurity](https://images.squarespace-cdn.com/content/v1/64df0e9653894b1a9474b073/1710825185795-ZHNCE1RMARBKDJ1P58FQ/1709496192888.jpg)
![Protecting cloud data means backing it up](https://images.squarespace-cdn.com/content/v1/64df0e9653894b1a9474b073/1710824764363-KW1EKUX0GDM5GILV162G/1709178458383.jpg)
![Increasing email protections may impact business communications](https://images.squarespace-cdn.com/content/v1/64df0e9653894b1a9474b073/1710824238334-XBYNK3HST8C0M0NDT931/1705357773092.jpg)
![Five cybersecurity posture questions for all organisations](https://images.squarespace-cdn.com/content/v1/64df0e9653894b1a9474b073/1700211572070-MFMBSHOCG8TJ57KDHJAB/image-asset.jpeg)
Five cybersecurity posture questions for all organisations
Five simple questions every organisation can ask itself to ascertain their cybersecurity posture.
![Reducing the risk of supply chain attacks](https://images.squarespace-cdn.com/content/v1/64df0e9653894b1a9474b073/1700212054119-4YCV1BE7JTGDR4G57FIL/image-asset.jpeg)
Reducing the risk of supply chain attacks
Supply chain attacks are when third-parties we rely on are the cause of a breach. Learn how to start defending yourself against them.
![Who bears the responsibility for cybersecurity?](https://images.squarespace-cdn.com/content/v1/64df0e9653894b1a9474b073/1700212404041-PLZHRZRFG93L347PM0TN/image-asset.jpeg)
Who bears the responsibility for cybersecurity?
Cybersecurity is not a technology problem, it’s a business problem, and it requires business governance.
![Responding to risk](https://images.squarespace-cdn.com/content/v1/64df0e9653894b1a9474b073/1700209849438-VV5OSAO6L7F9K5JXQM38/image-asset.jpeg)
Responding to risk
The five responses to risk that organisations can adopt, including one that they really shouldn’t.
![What is a vCIO? Should I engage my MSP to provide this service?](https://images.squarespace-cdn.com/content/v1/64df0e9653894b1a9474b073/1700210573151-I5DJ978OKL06JTKNWL3M/image-asset.jpeg)
What is a vCIO? Should I engage my MSP to provide this service?
Virtual, or Fractional, CIOs, provide essential governance and technology oversight to small to medium enterprises. How are they best engaged with?