The technology sector is always evolving, and so is CMS Distribution. Keep up to date with both market news, and the UK and Ireland’s largest independent value-added distributor.

11 phishing attacks e-book

11 phishing attacks e-book

Phishing and other social engineering attacks are only increasing in frequency, and unfortunately, sophistication. Today, over 90% of cyberattacks begin with a user clicking on a phishing email. As these attacks evolve rapidly and users continue to be the weakest security link – all it takes is just one employee to put an entire business at risk. […]

More
As with security, data backup should happen in layers

As with security, data backup should happen in layers

Automatic cloud backup is the best way to protect digital files from computer viruses, IT security threats, accidental deletions and natural disasters. In our recent blog, ‘Why you need more than built in anti-virus protection’ we tackled the issue of whether antivirus protection is worth paying for anymore, we thought we’d take a minute to […]

More
Why you need more than built-in Antivirus protection

Why you need more than built-in Antivirus protection

Most major tech blogs have run some variation of the following headline in recent months: Is it worth paying for an antivirus solution anymore? The insinuation, of course, is that built in antivirus solutions for Mac and Windows machines have progressed to such a point that it’s no longer worth reinforcing them with a paid solution. […]

More
16 Questions to Ask in a Cybersecurity Vulnerability Assessment

16 Questions to Ask in a Cybersecurity Vulnerability Assessment

Cybersecurity purpose-built for businesses Tired of forcing an enterprise or out-of-the-box solution to work for your business? Webroot’s cyber resilience solutions are built to save your business time and money. To create a security plan that actually works, managed service providers (MSPs) and small and medium sized businesses (SMBs) should start by assessing the risk […]

More
Why Hackers hack e-book

Why Hackers hack e-book

Lockdown lessons from Webroot As cybersecurity grows more complex, criminals around the world are evolving along with it. Their methods leave businesses vulnerable and everyone is at risk. Staying informed on this ever-changing landscape is vital. In this educational e-book, Webroot interviewed cybersecurity experts to discover the truth about hackers and explain: How to debunk […]

More
Pay attention to the Hacker behind the hoodie

Pay attention to the Hacker behind the hoodie

There’s a common misconception among small businesses and medium-sized businesses (SMBs) that hackers only target large organisations. This belief couldn’t be further from the truth. In fact, according to the most recent Verizon Data Breach Investigations Report, more than 70% of cyberattacks target small businesses. Additionally, many attacks are now shifting to target managed service providers […]

More
The Truth about Hackers, in Black and White (and Grey)

The Truth about Hackers, in Black and White (and Grey)

Did you know there are three primary types of hacker? White hats, black hats, and grey hats—and that there are subcategories within each one? Despite what you may have heard, not all hackers have intrinsically evil goals in mind. In fact, there are at least 300,000 hackers throughout the world who have registered themselves as white […]

More
Get two months free!

Get two months free!

Buy a 1-year license to protect your endpoints and get the first 2 months for free. Available for Carbonite Endpoint and Carbonite Backup for Microsoft 365 The current global COVID-19 pandemic has fundamentally changed the way businesses and their employees operate. During this difficult time, we want to be supportive and help companies to protect […]

More
13 email threat types to know about right now

13 email threat types to know about right now

    How inbox defence protects against increasingly sophisticated attacks. Protect businesses from all the top email threats, including the sophisticated ones designed to slip through a secure gateway. Don’t miss this in-depth look at today’s wide range of evolving email threats, including their risks and impacts on businesses, and how machine learning and API-based […]

More
Carbonite Backup for Microsoft 365

Carbonite Backup for Microsoft 365

Many organisations believe that moving to Microsoft Office 365 eliminates the need for backup. The reality of this is far from the truth. With Carbonite Backup for Microsoft 365 you can store backups independently from Microsoft servers and enable granular restores of Microsoft Office 365 files, folders, and applications. This helps to ensure that you […]

More