The technology sector is always evolving, and so is CMS Distribution. Keep up to date with both market news, and the UK and Ireland’s largest independent value-added distributor.

Backup is the backbone of Cyber Resilience

Backup is the backbone of Cyber Resilience

A recent report revealed that across the globe, the backup habits of businesses and their employees alike aren’t that great. For example, even though 42% of workers have needed to access a backed-up file since the pandemic began, only 26% actually back up their data to ensure it’s recoverable in the event of a cyberattack. Additionally, […]

More
It’s time to talk seriously about deepfakes and misinformation

It’s time to talk seriously about deepfakes and misinformation

Like many of the cyber threats, such as phishing scams or chatbots  – deepfakes aren’t necessarily new. They’re just getting a whole lot better, which has major implications for businesses. The increasing ease with which deepfakes can be created also troubles Kelvin Murray, a senior threat researcher at Webroot. “The advancements in getting machines to […]

More
Protect your customers with a strong line-up of cyber-defence tools

Protect your customers with a strong line-up of cyber-defence tools

When you consider modern attacks, it’s pretty obvious that all businesses, whether they are small- to medium-sized businesses (SMBs) or a large Enterprise organisation, need a strong line up of cyber-defence tools, not just a barebones firewall and old-fashioned antivirus. You need to protect your customers first, and to do that, you have to build […]

More
11 phishing attacks e-book

11 phishing attacks e-book

Phishing and other social engineering attacks are only increasing in frequency, and unfortunately, sophistication. Today, over 90% of cyberattacks begin with a user clicking on a phishing email. As these attacks evolve rapidly and users continue to be the weakest security link – all it takes is just one employee to put an entire business at risk. […]

More
As with security, data backup should happen in layers

As with security, data backup should happen in layers

Automatic cloud backup is the best way to protect digital files from computer viruses, IT security threats, accidental deletions and natural disasters. In our recent blog, ‘Why you need more than built in anti-virus protection’ we tackled the issue of whether antivirus protection is worth paying for anymore, we thought we’d take a minute to […]

More
Why you need more than built-in Antivirus protection

Why you need more than built-in Antivirus protection

Most major tech blogs have run some variation of the following headline in recent months: Is it worth paying for an antivirus solution anymore? The insinuation, of course, is that built in antivirus solutions for Mac and Windows machines have progressed to such a point that it’s no longer worth reinforcing them with a paid solution. […]

More
16 Questions to Ask in a Cybersecurity Vulnerability Assessment

16 Questions to Ask in a Cybersecurity Vulnerability Assessment

Cybersecurity purpose-built for businesses Tired of forcing an enterprise or out-of-the-box solution to work for your business? Webroot’s cyber resilience solutions are built to save your business time and money. To create a security plan that actually works, managed service providers (MSPs) and small and medium sized businesses (SMBs) should start by assessing the risk […]

More
Why Hackers hack e-book

Why Hackers hack e-book

Lockdown lessons from Webroot As cybersecurity grows more complex, criminals around the world are evolving along with it. Their methods leave businesses vulnerable and everyone is at risk. Staying informed on this ever-changing landscape is vital. In this educational e-book, Webroot interviewed cybersecurity experts to discover the truth about hackers and explain: How to debunk […]

More
Pay attention to the Hacker behind the hoodie

Pay attention to the Hacker behind the hoodie

There’s a common misconception among small businesses and medium-sized businesses (SMBs) that hackers only target large organisations. This belief couldn’t be further from the truth. In fact, according to the most recent Verizon Data Breach Investigations Report, more than 70% of cyberattacks target small businesses. Additionally, many attacks are now shifting to target managed service providers […]

More
Get two months free!

Get two months free!

Buy a 1-year license to protect your endpoints and get the first 2 months for free. Available for Carbonite Endpoint and Carbonite Backup for Microsoft 365 The current global COVID-19 pandemic has fundamentally changed the way businesses and their employees operate. During this difficult time, we want to be supportive and help companies to protect […]

More