Node4
  • Starcom
  • About us
    • Case Studies
    • Partners
    • Careers
    • Community / CSR
  • Managed Services
    • Microsoft 365
    • Remote Desktop
    • Software
    • Hardware
    • Service desk
    • Document Backup
    • Online backup
    • Consultancy
    • RMM
    • Disaster recovery
    • Microsoft
    • Cloud Services
  • Application Hosting
    • Microsoft Dynamics AX
    • Microsoft Dynamics NAV
    • SYSPRO
  • Starcom Cloud
  • Sage 200
    • Desktop for End Users
    • Desktop for Partners
  • Security
    • Security Surgery
    • Security audit
    • Antivirus
    • Firewall protection
    • Web content filtering
    • Email filtering
  • Productivity
  • Blog
  • Contact Us
0844 579 0800

Blog

Tom Mercer

ransomware and cyber insurance

Ransomware and cyber insurance: a quick guide

The ransomware attack on a US fuel pipeline has turned conversation toward cyber insurance. Read our tips for securing a great policy.

20/05/2021 READ MORE
remote working productivity

Remote work productivity – save 2 hours in your day

Is this the blueprint for remote work productivity? Follow our technology and wellbeing tips to save 2 hours in your working day.

31/03/2021 READ MORE
post-covid security audit findings

Case Study: Manufacturing Security Audit

Rapid changes to the cyberthreat landscape and a shift in operations caused concern for this manufacturer – and for good reason. Read our security audit findings here.

26/11/2020 READ MORE
It helpdesk horror stories

Helpdesk Horror Stories: When Tech Fights Back…

Volume 5 of our Halloween IT horror stories has risen from the grave! Read the terrifying tales, if you dare…

29/10/2020 READ MORE
test your DR plan

How to test your DR plan: downloadable guide

Our downloadable guide explains how to efficiently test a DR plan, from automated tasks through to complete simulations.

02/09/2020 READ MORE
what remote working is really like

What we’re finding out about remote working

Many of us have been discovering a whole lot about the home working world with uncanny shared experiences, from little irritations to heart-warming surprises.

22/04/2020 READ MORE
12 tips for home workers

12 tips for any home worker infographic

Whether you’re a remote working veteran or you’ve only ever been office-based, our top tips infographic will help you to keep safe and secure when working from home.

09/04/2020 READ MORE
microsoft 365 backup

Who is responsible for backup in Microsoft 365?

Many aren’t aware that without Microsoft 365 Backup, their cloud data in platforms such as OneDrive and Sharepoint isn’t fully backed up or recoverable.

30/03/2020 READ MORE
ways to prevent a ransomware attack 2020

8 ways that you can outsmart ransomware

Do you know how to outsmart ransomware? Check out our infographic for the 8 steps you and your team should take to maintain an effective shield against attack.

20/02/2020 READ MORE
What is an Intrusion attack

Intrusion attacks vs firewall breaches

An intrusion attack is not the same as a firewall breach – it’s committed by and undertaken within your own private network. We answer key FAQs here.

02/12/2019 READ MORE
VIEW MORE BLOGS

Categories

  • Cloud
  • Cybersecurity
  • Digital Transformation
  • DR and BC
  • Infrastructure
  • Microsoft
  • Network
  • News
  • Productivity
  • Remote Working
  • Software and Hardware

Get Social

Policies

  • Privacy
  • Cookie Policy

Starcom Technologies Limited | Registered Office: Unit 1/1A, Millennium Way, Pride Park, Derby, DE24 8HZ. Company number: 02286795 Registered in England and Wales.

DOWNLOAD THE

PRODUCT GUIDE:

By submitting this form you agree with the data processing rules laid out in our privacy policy.

DOWNLOAD THE

PRODUCT GUIDE:

By submitting this form you agree with the data processing rules laid out in our privacy policy.

DOWNLOAD THE

PRODUCT GUIDE:

By submitting this form you agree with the data processing rules laid out in our privacy policy.

DOWNLOAD THE

PRODUCT GUIDE:

By submitting this form you agree with the data processing rules laid out in our privacy policy.

DOWNLOAD THE

PRODUCT GUIDE:

By submitting this form you agree with the data processing rules laid out in our privacy policy.

DOWNLOAD THE

PRODUCT GUIDE:

By submitting this form you agree with the data processing rules laid out in our privacy policy.

DOWNLOAD THE

PRODUCT GUIDE:

By submitting this form you agree with the data processing rules laid out in our privacy policy.

DOWNLOAD THE

PRODUCT GUIDE:

By submitting this form you agree with the data processing rules laid out in our privacy policy.

DOWNLOAD THE

PRODUCT GUIDE:

By submitting this form you agree with the data processing rules laid out in our privacy policy.

DOWNLOAD THE

PRODUCT GUIDE:

By submitting this form you agree with the data processing rules laid out in our privacy policy.

DOWNLOAD THE

PRODUCT GUIDE:

By submitting this form you agree with the data processing rules laid out in our privacy policy.

DOWNLOAD THE

PRODUCT GUIDE:

By submitting this form you agree with the data processing rules laid out in our privacy policy.

DOWNLOAD THE

PRODUCT GUIDE:

By submitting this form you agree with the data processing rules laid out in our privacy policy.

DOWNLOAD THE

PRODUCT GUIDE:

By submitting this form you agree with the data processing rules laid out in our privacy policy.

DOWNLOAD THE

PRODUCT GUIDE:

By submitting this form you agree with the data processing rules laid out in our privacy policy.

DOWNLOAD THE

PRODUCT GUIDE:

By submitting this form you agree with the data processing rules laid out in our privacy policy.

Manage Cookie Consent
We use cookies to optimise our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}