
IT Blog

Technology event Q&A – February 2023
We run monthly tech Q&A events to give organisations the opportunity to get their questions answered. In this blog we share some of the questions we received at the [...]

EDR, MDR, XDR, SIEM, SOC – understanding the jargon in cybersecurity monitoring
The cybersecurity product market is full of acronyms which can make it hard to determine what security monitoring services you need, and what benefits you get from them, this [...]

Introducing Secure+ from ramsac: Keeping a watchful eye on your IT estate
We are thrilled to be launching secure+ our most significant product launch in over a decade. Secure+ is a proactive cybersecurity monitoring service designed to keep a watchful eye [...]

Ask the expert: answering the internet’s most common Phishing questions
Phishing attacks are a huge risk for organisations in this blog our lead cybersecurity consultant answers the most common questions we get about phishing. [...]

ramsac named as one of the UK’s best places to work
We were thrilled to be named the number 1 business services employer in the UK at the Best companies to work for. [...]

What is cyber insurance and do you really need it?
Cyber insurance can mitigate a business against damages and financial loss caused by a cyberattack. But what does cyber insurance cover? Find out here. [...]

The importance of supply chain cybersecurity and risk management
Supply chains are areas of increasing cybersecurity risk. What is the exact problem, and how can you address it? Discover this and more in our latest blog. [...]

Still using Windows Server 2012? – You are at risk
If you have machines still using Server 2012 you are now at risk and we advise you take immediate action to upgrade to a current Microsoft Operating System. [...]

The worst cybersecurity attacks from 2022
If 2022 has taught businesses anything, it’s that cybersecurity attacks, breaches and leaked data are incredibly costly. Here are some of the worst attacks from 2022. [...]