CONSIDER IT BLOG
Blog & News
Keeping your eyes on the horizon and your ear to the ground can be tricky to do all at once, so we're doing it for you. Check out the latest tech news and our own blogs below to keep up to speed with everything you need to know regarding your business IT, communications, and cyber security.
Celebrating a New Milestone: Consider IT Becomes a Certified B-Corp
We are thrilled to announce that Consider IT has officially become a Certified B Corporation! This is a significant milestone for us, reflecting ou...
Volkswagen Group has over 19,000 sensitive documents stolen in Cyber Attack
The recent security breach at Volkswagen Group serves as a stark reminder of the ever-looming threat of cyber attacks. With over 19,000 sensitive d...
Staying Ahead of the Game: 7 Strategies to Combat Malware and Ransomware
When it comes to protecting your business from cyber threats, malware and ransomware remain two of the more pervasive and damaging. These malicious...
Counting the Costs: Understanding the Financial Impact of Cyber Attacks on Businesses
Cyber attacks, once considered a distant concern, have become a pressing reality for organisations of all sizes and industries. Beyond the immediat...
The Importance of Cyber Security Awareness Training
Did you know that the leading cause of successful cyber attacks is attributed to human error? Unfortunately, the weakest link in your security chai...
The Personal Touch: Why Choosing a Local, Independently Owned IT Support Provider Trumps Big Corporations
You rely on your IT partner to keep your operations running smoothly, so you can focus on running your business. While large, big name corporations...
Consider IT Achieves Prestigious ISO 22301 and ISO 20000-1 Certifications for Business Continuity and IT Service Management
We are thrilled to announce a significant milestone for Consider IT – the successful achievement of two prestigious certifications: ISO 22301 for B...
Strengthening Cyber Security Defences: The Crucial Role of Multi-Factor Authentication
Have you implemented multi-factor-authentication (MFA) across your organisation? While promoting the adoption of robust passwords is essential, the...
Navigating the IT Support Onboarding Process: A Comprehensive Guide
Taking on a new IT Support provider can seem quite daunting, whether you’re entirely new to the world of IT support, or switching from an existing ...