Is your organisation de-CAF-inated?

In this case, decaf is not necessarily a good thing. The NCSC has just released the latest CAF (Cyber Assessment Framework) to help especially large organisations or ones that are considered critical in the national infrastructure (think health care, water, electricity etc.) or are directly involved in public cyber security, to check that their own […]

Continue Reading

GDPR | Latest ICO draft guidance - condensed.

The Latest ICO draft guidance | February 2020 Written by Christoan Smit, Data Protection Office. Historically, the ICO has only written fines for two things: Actual data leaks and non-compliant marketing, with the latter attracting fines in the tens or even hundreds of thousands, even for small companies. The ICO has recently released its new […]

Continue Reading

Our Accreditations & Certifications

Venom IT is now officially a G-Cloud-approved Cloud Services Provider, in addition to already being Cyber Essentials, ISO9001 and ISO27001 certified. But, what do all these certifications mean, and are they really important? G-Cloud G-Cloud is, in simple terms, a list of pre-approved suppliers from whom any government institution (that would normally be required to […]

Continue Reading

Venom IT has passed our 2019 ISO audits!

Great news – Venom IT has passed our 2019 ISO audits! This year, the audit was a tad more complicated, as we have added ISO 27018 as an additional standard. ISO 27018 establishes controls and guidelines for protecting Personally Identifiable Information (PII) within the public cloud computing environment. It also takes into account regulatory requirements […]

Continue Reading

DDid you hear about DDoS?

Imagine arriving at home, and someone’s put a padlock and chain across your front door. In IT, that’s called a DoS (Denial of Service) attack. A DoS attack is usually perpetrated by a single hacker who manages to take down a server (or even an entire data centre), making it impossible for legitimate users to […]

Continue Reading

5 Things to Keep in Mind When Deploying Multiple Computers in Larger Organisations

When deploying multiple machines (and for the purposes of this article we're talking dozens, hundreds or even thousands) there are 4 distinct stages to the overall deployment process, and they need to be done correctly and in the correct order.

Continue Reading

Cloud vs Onsite – a few things to consider if you’re a Public Sector organisation

Many organisations still feel that having their own, dedicated, onsite equipment is the best solution, yet the shift towards Cloud services is getting increasingly stronger. This raises the obvious questions: Is Cloud the right move for you? And, if yes, how to pick the right services?

Continue Reading

How to avoid getting Crypto Locked

You’ve seen what it looks like on the TV. You might even know one or two people to whom it has actually happened. Yes, we’re talking about that moment when all your hard work gets ‘kidnapped’ by a cyber criminal and held hostage, with threats of destroying it all unless you pay up before their […]

Continue Reading

Is OneDrive safe to use for your Accounting Practice?

We recently had a query in this regard and, we didn’t want to simply give an off-the-cuff answer or an over-simplified ‘Yes’ or ‘No’. Therefore we decided to do some digging by reading numerous forums, discussion boards and such, in order to understand the real-world problems people are experiencing with OneDrive. The Out-and-out Good Stuff […]

Continue Reading

5... Gee! What have we done?

5G - In an effort to get faster connection speeds, a few shortcuts were taken on the security side of things, and some convenient assumptions made during the design process have proven to be wrong, making the security debacle even worse.

Continue Reading
1 2