Assessing Cyber Risk – How secure is your business?
Author: Emily Martins Cybersecurity Consultant, JT Enterprise Over the last few years, cyber crimes have been at the forefront of ...
Cyber Compliance – a better way of working
Author: John Bridge Principal Cybersecurity Consultant, JT Enterprise Cybersecurity is no longer just about protecting your data and digital assets ...
SaaS Backup: How Secure is Your Data in 3rd Party Apps?
Author: Paul Gray Product Portfolio Manager (Cloud), JT Enterprise Software as a Service (SaaS) has revolutionised how we deliver and ...
5 Back-up and Disaster Recovery Myths to Avoid
Author: Paul Gray Portfolio Manager, JT Enterprise Despite both being fundamental to business continuity, there is still a lot of ...
Digital Risk Protection – reputational and data-based risks on the rise
Author: John Bridge Cybersecurity Consultant, JT Enterprise As businesses have transitioned into alternative methods of working, they have faced one ...
Prevention is better than cure
Author: Sunny Ajanaku Professional Services Manager, JT Enterprise Data Backup – Misconceptions and risks around your business’s 365 data Almost ...
ISO Implementation – How to get started
Author: Emily Martins Cybersecurity Consultant Organisations increasingly have to be able to demonstrate to suppliers, end-customers and regulators that they ...
JT’s SD-WAN Solution
Technology that makes change possible SD-WAN has long been considered the saviour of network management and the answer to solving ...
5 productivity secrets for large remote teams
Author: James Singleton Partner Manager & Product Specialist, JT Enterprise Remote work is here to stay. which means we have some ...
Preparing for a remote or multi-office future
Author: James Singleton Partner Manager & Product Specialist, JT Enterprise Flexibility and agility are two of the most important characteristics ...
7 core benefits of Webex Calling
Author: James Singleton Partner Manager & Product Specialist Webex Calling is a cloud PBX system. With all of the core ...
What is Webex Calling? And how does it compare to other cloud-based phone systems?
Author: James Singleton Partner Manager & Product Specialist Employees no longer expect to be beholden to an office. They want ...
Why remote teams need Webex Calling
Author: James Singleton Partner Manager & Product Specialist The remote working revolution is here. While flexible working is often credited ...
Cybersecurity Awareness: DDoS attacks rise sharply with increased ferocity, sophistication and volume in 2020
Author: David Salisbury Product Portfolio Manager - Security The overwhelming shift to remote or home working coupled with an increase ...
JT SOC Services
Author: Jon Collinson Head of Product Development Global cybersecurity spending reached $124billion (£98.8billion) in 2019, and that cost is going ...