Subscribe to One Blog for the Latest Industry News, Disruptive Tech Ideas and Impactful Thought Leadership.

How To Prevent The Rising Ransomware Attacks On Healthcare Organisations

Posted by James Griffiths on 28/09/22 16:57

The number of ransomware attacks has risen sharply in recent years, in every industry, from hospitality firms to the energy sector. Ransomware has the potential to be devastating to any business, ruining their reputation, leaking their secrets, and costing them vast amounts of money, but it’s the healthcare sector that faces the greatest threat, as cyber attacks could leave lives hanging in the balance. Keep reading to learn what organisations can do to protect their data - and their patients.

KEEP READING

Topic malware ransomware cyber security healthcare

Why You Should Consider A Cyber Assessment

Posted by Guest Blogger on 15/06/22 14:23

Most systems evolve over time, especially when it comes to subscriptions to services such as Microsoft 365 or Azure Active Directory. These often release new updates and features which are rolled out to customers, and can be easily integrated with your systems. Their ease of use makes them more accessible to small-to-medium enterprises - however, if left unchecked, they could result in vulnerabilities in your system. It’s important to deal with any gaps in your defences, and if you don’t know what to look for, a cyber assessment could help you address any risks and prevent a data breach from happening within your organisation.

KEEP READING

Topic cyber security cyber assessment

Why The Future Of The Metaverse Depends On Its Security

Posted by Guest Blogger on 27/05/22 12:10

The metaverse has been making headlines recently, with its promises of merging the digital and physical world. It’s something that sci-fi books and films have been promising for decades now, but it’s only in the past few months that people like Mark Zuckerberg have started talking about it, calling it the “successor to the mobile internet.” While it could change the way we interact with each other, the new technology could create many more opportunities for cyber criminals. Whether or not the metaverse is a success really depends on how secure it is.

KEEP READING

Topic Technology cyber security AR VR metaverse

The Cyber Risks of Connected Medical Devices

Posted by Guest Blogger on 16/05/22 11:59

Internet of Things (IoT) devices have become ubiquitous in recent years - there are almost as many of them connected to the internet as there are people on the planet. In fact, research suggests that by 2025, there’ll be 75 billion IoT devices. However, while they can make life easier and more connected, there are security concerns, particularly in regards to devices that are essential to an individual’s medical care. In these cases, a successful cybersecurity breach on the Internet of Medical Things (IoMT) devices could potentially have devastating consequences.

KEEP READING

Topic IOT cyber security medical IoMT

The Pros and Cons of SASE

Posted by Guest Blogger on 12/05/22 12:59

With cyber attacks, ransomware gangs, and phishing scams on the rise all over the world, and more people working remotely, cyber security has become more necessary than ever, and at FluidOne, we’re ready to help, and we’ve partnered with the global SASE leader, Zscaler, to offer its services to its users. Many businesses and organisations are turning to SASE to protect their data, which is one of the many services we provide to our clients. If you’re unfamiliar with it, though, or just wondering if it’s right for you, keep reading as we take a closer look at the pros and cons of the emerging technology.

KEEP READING

Topic cyber security SASE network security

How Cloud Computing is Revolutionising the Construction Industry

Posted by Guest Blogger on 03/05/22 16:48

Although cloud computing has been around for a while, it’s only in recent years that we’ve begun to realise its full potential, it’s already had a massive impact on all kinds of sectors, from retail to healthcare. Cloud computing lies at the heart of the digital transformation for many organisations, as it allows them to be more scalable and accessible, increase their cyber security, and much more. Many construction companies are turning to the cloud as their solution of choice, and at FluidOne, we’ve been working with companies in this sector since our inception.

KEEP READING

Topic IOT cloud computing mobile cyber security SASE construction industry

Getting from A to B: Top 3 Solutions for Transport and Logistics

Posted by Guest Blogger on 25/04/22 12:29

Recent advances in technology have helped to create an ever more connected world, transforming businesses and even entire industries. In the transport and logistics sector, connected cloud solutions have been a game-changer, and if you’re in the industry, here are the top three ways in which these solutions could help your business. 

KEEP READING

Topic IOT SD-WAN cyber security Transport & Logistics

Critical Infrastructure Attacks: Considerations for Small-to-Medium Enterprises

Posted by Guest Blogger on 24/03/22 10:28

In the UK, Critical National Infrastructure (CNI) is defined by the National Cyber Security Centre (NCSC) as ‘Those critical elements of Infrastructure (facilities, systems, sites, property, information, people, networks and processes), the loss or compromise of which would result in a major detrimental impact on the availability, delivery or integrity of essential services, leading to severe economic or social consequences or to loss of life.’ This encompasses thirteen sectors: chemicals, civil nuclear, communications, defence, emergency services, energy, finance, food, government, health, space, transport, and water.

KEEP READING

Topic Cloud cyberattacks ransomware cyber security

Leading The Future Of Network Security

Posted by Guest Blogger on 15/03/22 12:09

Network security, whether in a home or business setting, is absolutely vital. We all know that without some form of security solution our network is at risk of a cyber security breach,  which could compromise personal and business data such as financial data, confidential documents, or private client contact information.

KEEP READING

Topic Network 5G SD-WAN cyber security

The Security Risks of Smart Speakers

Posted by Guest Blogger on 25/02/22 11:42

The IoT, or Internet of Things, encompasses everything connected to the internet, but it’s increasingly used to describe objects that communicate with one another, from smartphones and smart watches, to smart TVs and smart speakers. However it doesn't stop there, as the race to connect everything to the internet isn’t showing any signs of slowing down - at present, there are over 27 billion devices connected to the internet. 

KEEP READING

Topic IOT The Internet of Things cyber security Smart Devices