Top 6 Benefits of Microsoft Azure

There’s no denying that cloud computing is part of the future for businesses everywhere. Rather than the costly option of physically owning and maintaining a dedicated IT system of servers and storage, it allows users to access shared technology services using a cloud platform. Microsoft Azure is a leading option for cloud computing, with its […]

Penetration Testing vs Vulnerability Assessment – What’s the Difference?

two men looking at a laptop performing a penetration test

Cyber-attacks are an ongoing threat to organisations and it is imperative that businesses have effective security solutions in place. The identification of vulnerabilities, risks and weaknesses within computer and network security systems is essential to help avoid attacks. Two of the major tests or assessments to do this are penetration testing and vulnerability assessments. In […]

What is Microsoft Power Platform?

close up of laptop nearly closed with colourful screen reflecting on keyboard

Microsoft Power is a set of applications that can help businesses to boost productivity and make their IT processes easier. In this brief article, we’ll break down what Microsoft Power is, go through the different apps within it, and understand how its different components can help businesses to streamline their processes. What is the Microsoft […]

Don’t Take the Bait: Essential Phishing Training For Employees

Employees at desk typing on keyboard

What is phishing? Phishing is the most prevalent form of cyber threat to organisations and individuals. Cybercriminals use fraudulent emails and erroneous website links, often impersonating legitimate ones, and trick the recipient into providing sensitive information. Other phishing emails might include an attachment which downloads malware. Phishing is known to be the most prolific form […]

Mintivo Announces New Managing Director: Alex Jukes

Alex Jukes stood in front of Mintivo sign

We’re pleased to announce Alex Jukes as Mintivo’s new Managing Director! Alex has been an invaluable member of the team, leading our commercial arm for the past three years. His dedication and strategic vision have been pivotal in driving growth, with year-on-year increases of over 40%. Alex will now focus on nurturing our people and […]

What is Endpoint Security and How Can it Protect Against Cyber Threats?

laptop with padlock

What is endpoint security? Endpoint security protection is designed to form part of an organisation’s cyber security programme. Due to the increasingly sophisticated attacks taking place, it is an essential tool in a company’s security toolbox. The specific job of endpoint security is to ensure that all endpoint devices – such as desktops, laptops and […]

What is the Difference Between a Risk Assessment and an IT Security Audit?

Elderly technical support consultants working to maintain uptime in high tech place. Skilled specialists brainstorming solutions to data center server racks crashing, trying to fix components

Terms such as assessment and audits are sometimes used interchangeably, however it is important to understand the differences. Generally speaking, an assessment is an internal check on how a company operates. It can be carried out against a simple list of what’s important to the company’s management team, or made against a more comprehensive, external […]

What is an IT Security Audit?

Cyber Security Protection Firewall Interface Concept

Cybercrime is on the rise. In fact, it’s estimated there were 2.39 million instances of cyber crime and approximately 49,000 instances of fraud as a result of cybercrime across UK businesses in the past 12 months. Although a very significant threat, there are steps you can take to minimise your risk of being exposed to […]

Beyond Spam Filters: Advanced Techniques for Email Security

Man checking his email on a laptop

Why is email security important? Emails are one of the easiest routes for hackers to spread malware or for criminals to undertake scams. Malware can be very sophisticated, often loading ransomware or viruses which have the ability to access data or disable your systems. Attackers are increasingly finding new and more complex ways to exploit […]

Microsoft Teams vs Google Meets

Five years ago, online conference calls were the exception. They required expensive hardware, unwieldy software, and a good experience was not always guaranteed. The recent global pandemic, with the requirement to stay socially distanced and work from home, changed all that. Now online conference calls are the norm and there are a myriad of options […]