Subscribe to One Blog for the Latest Industry News, Disruptive Tech Ideas and Impactful Thought Leadership.

The Pros and Cons of SASE

Posted by Guest Blogger on May 12, 2022 12:59:32 PM

With cyber attacks, ransomware gangs, and phishing scams on the rise all over the world, and more people working remotely, cyber security has become more necessary than ever, and at FluidOne, we’re ready to help, and we’ve partnered with the global SASE leader, Zscaler, to offer its services to its users. Many businesses and organisations are turning to SASE to protect their data, which is one of the many services we provide to our clients. If you’re unfamiliar with it, though, or just wondering if it’s right for you, keep reading as we take a closer look at the pros and cons of the emerging technology.

KEEP READING

Topic cyber security SASE network security

How Cloud Computing is Revolutionising the Construction Industry

Posted by Guest Blogger on May 3, 2022 4:48:36 PM

Although cloud computing has been around for a while, it’s only in recent years that we’ve begun to realise its full potential, it’s already had a massive impact on all kinds of sectors, from retail to healthcare. Cloud computing lies at the heart of the digital transformation for many organisations, as it allows them to be more scalable and accessible, increase their cyber security, and much more. Many construction companies are turning to the cloud as their solution of choice, and at FluidOne, we’ve been working with companies in this sector since our inception.

KEEP READING

Topic IOT cloud computing mobile cyber security SASE construction industry

Getting from A to B: Top 3 Solutions for Transport and Logistics

Posted by Guest Blogger on Apr 25, 2022 12:29:04 PM

Recent advances in technology have helped to create an ever more connected world, transforming businesses and even entire industries. In the transport and logistics sector, connected cloud solutions have been a game-changer, and if you’re in the industry, here are the top three ways in which these solutions could help your business. 

KEEP READING

Topic IOT SD-WAN cyber security Transport & Logistics

Critical Infrastructure Attacks: Considerations for Small-to-Medium Enterprises

Posted by Guest Blogger on Mar 24, 2022 10:28:28 AM

In the UK, Critical National Infrastructure (CNI) is defined by the National Cyber Security Centre (NCSC) as ‘Those critical elements of Infrastructure (facilities, systems, sites, property, information, people, networks and processes), the loss or compromise of which would result in a major detrimental impact on the availability, delivery or integrity of essential services, leading to severe economic or social consequences or to loss of life.’ This encompasses thirteen sectors: chemicals, civil nuclear, communications, defence, emergency services, energy, finance, food, government, health, space, transport, and water.

KEEP READING

Topic Cloud cyberattacks ransomware cyber security

Leading The Future Of Network Security

Posted by Guest Blogger on Mar 15, 2022 12:09:22 PM

Network security, whether in a home or business setting, is absolutely vital. We all know that without some form of security solution our network is at risk of a cyber security breach,  which could compromise personal and business data such as financial data, confidential documents, or private client contact information.

KEEP READING

Topic Network 5G SD-WAN cyber security

The Security Risks of Smart Speakers

Posted by Guest Blogger on Feb 25, 2022 11:42:40 AM

The IoT, or Internet of Things, encompasses everything connected to the internet, but it’s increasingly used to describe objects that communicate with one another, from smartphones and smart watches, to smart TVs and smart speakers. However it doesn't stop there, as the race to connect everything to the internet isn’t showing any signs of slowing down - at present, there are over 27 billion devices connected to the internet. 

KEEP READING

Topic IOT The Internet of Things cyber security Smart Devices

Protect Your Mobile Like Any Other Device

Posted by Guest Blogger on Feb 21, 2022 10:47:51 AM

A few years ago, if your phone happened to be hacked, someone would only gain access to your contacts and text conversations. Now, however, our lives revolve around our mobile devices as we not only use them to communicate but to pay for our morning coffee, track our workouts, watch videos, browse the internet, store photos and access files. 

KEEP READING

Topic mobile Internet mobile mobile security cyber security

A Cyber Essentials Update Is Coming On 24th January: Are You Ready?

Posted by James Griffiths on Jan 14, 2022 3:55:24 PM

Rapid digital transformation, mass adoption of cloud-based services and migration to home-working were necessary changes for businesses to survive the pandemic that’s held the world captive for the past two years. These dramatic changes over a short period of time presented cybercriminals with new opportunities for exploitation. 

KEEP READING

Topic mobile Internet mobile security cyber security

Introducing Cyber as a Service

Posted by David Woodfine on Dec 8, 2021 4:18:00 PM

The ideal solution to deal with your security woes. Ever heard of a successful breach that didn’t take advantage of a vulnerability in a firm’s cyber security posture? Neither have we! Staying one step ahead of cybercriminals is challenging. Once a vulnerability is identified, there is nothing to stop cybercriminals from trying their luck.

KEEP READING

Topic mobile Internet mobile security cyber security

​​The Rising Popularity of NFTs and The Rising Security Threat

Posted by David Woodfine on Nov 10, 2021 4:10:00 PM

The art world is known for being ahead of the curve, adopting new and interesting technologies to push the boundaries of what we define art to be. Currently, the hottest pieces to land in the art scene are non-fungible tokens, otherwise known as NFTs, which have grown so much in popularity that people are willing to spend incredible amounts on these intangible assets.

KEEP READING

Topic mobile Internet mobile security cyber security