
IT Blog

The Great Laptop Refresh: Why you should be reviewing your laptop’s health
Organisations need to refresh their laptops every 3- 4 years, we explore how they can do it smoothly and efficiently. [...]

The security risks of ChatGPT: how to stay safe with AI models
Artificial intelligence (AI) is a game-changing technology in this blog we explore the risks and benefits of using AI-powered language models such as ChatGPT [...]

Microsoft Viva benefits
Microsoft Viva has a variety of tools to help make the most of wellbeing at work. Discover how it could benefit you and your employees today. [...]

Announced: How Microsoft Copilot will revolutionise working life
Are you ready for a whole new way of working? Microsoft Copilot is set to revolutionise working life. [...]

How secure is MFA based on SMS and voice calls?
In this blog ramsac's cybersecurity expert Voke Augoye explores how secure Multi-factor authentication is when using SMS and voice calls. [...]

ramsac’s internal security practices – supply chain security
We have created a document outlining the security approach ramsac takes and our internal practices to reassure our supply chain that we take cybersecurity and the protection of the [...]

Microsoft Office – High Severity Vulnerability
Earlier this month Microsoft announced there was a High Severity vulnerability affecting Microsoft Office products. In this blog we explain what the vulnerability is and how to protect against it. [...]

Technology event Q&A – February 2023
We run monthly tech Q&A events to give organisations the opportunity to get their questions answered. In this blog we share some of the questions we received at the [...]

EDR, MDR, XDR, SIEM, SOC – understanding the jargon in cybersecurity monitoring
The cybersecurity product market is full of acronyms which can make it hard to determine what security monitoring services you need, and what benefits you get from them, this [...]