CBS Intelligence Centre

Category Archives: IT Support

  • migrating to the cloudOctober 12, 2017

    Migrating To The Cloud – Is Strategy Important?

      Developing a strategy is a central aspect of almost any business process, and migrating to the cloud requires much the same planning and consideration. Cloud services are becoming more and more popular by the day, and there is little doubt that it can be hugely beneficial to any business. However, migrating your data to the cloud is likely to be a big process, particularly as legal chambers store such large amounts of sensitive data. It is the sensitive nature … Read more
  • Improve Cyber SecuritySeptember 6, 2017

    5 Ways To Improve Your Cyber Security

    Do you need to improve cyber security? There are many reasons why it should be at the top of your list of priorities, whether it’s the impending implementation of GDPR or the increased fines for cyber security failures. Cyber security sits at the heart of everything we do, affecting how we use our technology, send emails, store and share data, and in doing business with other organisations. Every day the risks to our cyber security are greatly increasing, and we are being called on to … Read more
  • Security as a ServiceAugust 8, 2017

    Security as a Service – The Benefits For Cybersecurity

      On a day-to-day basis, cyber security is having to change and develop to match ever-changing cyber threats. It is something that all businesses, big and small, have to deal with, and it is constantly adding pressure to business leaders and managers. Security as a service can take the pressure off. Implementing robust cyber security measures is an absolute necessity, but doing it all yourself, in-house, need not be. With the development of new technologies and increasing use of the … Read more
  • legal softwareJuly 14, 2017

    Legal Software – Our Guide

      Managing a law firm and all the business aspects that go along with it can be challenging. In this digital era we are now living in, one of the best ways to simplify the day to day management of your law firm is through the introduction of software systems. These have so many benefits including making things more streamlined, reducing time and the potential of error. Many law firms utilise specialist software systems to ensure all the most important … Read more
  • Cyber Security and WomenJuly 7, 2017

    Cyber Security And Women – How Is The Future Looking?

      Female IT professionals are few and far between. Statistics show that globally, just 10% of IT professionals are women, while in Europe that number drops to just 7%. Numbers of women in cyber security and other areas of IT are continuing to drop in spite of the UK government’s attempts to close the skills gap within schools. Other agencies are also looking to promote interest and ability in IT, with cyber security having now been introduced through the Brownies … Read more
  • improve business IT performanceApril 21, 2017

    5 Hassle-Free Ways To Improve Business IT Performance

      In comparison to how we conducted business a decade or so ago, technology is now at the forefront of business innovation. Companies are in an ongoing race to adapt with the times and utilise the best digital services and products that are on the market, in order to push their organisation to the next level. However, technology is no guarantee for business success. A company that wants to evolve and improve business IT performance must tailor technology to the … Read more
  • advantages of cloud securityJanuary 13, 2017

    The Advantages Of Cloud Security

      The use of cloud-based storage has increased hugely for both business and personal use over the past few years and 2017 is set to see this usage growing even further. As a result, cloud security must also improve. While improvements in any area of cybersecurity are always needed through continuous assessment and feedback, cloud security is already widely accepted as one of the most robust and reliable forms of IT security available today. Here we examine the current advantages … Read more
  • cybersecurity skills gapDecember 22, 2016

    Cybersecurity Skills Gap: What Does It Mean For Your Chambers?

    1 in 4 IT professionals say a lack of skilled cybersecurity workers is responsible for cyber theft affecting their businesses. It is estimated that as many as 15% of all cybersecurity jobs will go unfilled by 2020, leaving a significant hole in many businesses’ IT security strategies. Finding ways to fill the cybersecurity skills gap and methods to bypass the shortage of IT security professionals entirely will be essential to keep businesses safe in the future. The cybersecurity industry and … Read more
  • internet of thingsDecember 9, 2016

    The Internet of Things and Cyber Security

      According to some predictions, there will be as many as 34 billion devices globally connected to the internet by 2020. Of these, more than two-thirds are expected to be part of the Internet of Things (IOT). The Internet of Things has many advantages, such as letting you control you home heating system from your phone, but it also comes with risks. The IoT was instrumental in the recent cyber attack on the US which brought down the internet across … Read more
  • foreign actorsNovember 24, 2016

    ‘Foreign Actors’ – The Threat to UK Cybersecurity

      Cyber security threats are increasing day by day, and it is not just individuals and businesses that are being threatened. With improvements in technology and access to the internet, and with more and more information being stored electronically, so-called ‘foreign actors’ are finding new ways to threaten not just cyber security, but also national security. It is because of this that Phillip Hammond, Chancellor of the Exchequer, has announced a spend of £1.9 billion to fund improvements in national … Read more
  • November 18, 2016

    VOIP Security – Is Acoustic Eavesdropping a Concern?

      When you are using VOIP to speak to clients and co-workers, do you ever worry that hackers could be using those calls to steal critical data, including usernames and passwords? Incredible as it might seem, recent research shows that it is now possible for hackers to break into your VOIP calls and monitor the sounds your keyboard makes as you type. This is known as “acoustic eavesdropping”. From these sounds, hackers can work out with a worrying degree of … Read more
  • removing passwordsSeptember 16, 2016

    Will Removing Passwords Make our Data Safer?

    “Choose strong passwords with letters, numbers, and special characters to create a mental image or an acronym that is easy for you to remember. Create a different password for each important account, and change passwords regularly.” – MIT Information Systems and Technology (Top Ten Safe Computing Tips) Although this advice seems simple in theory, the reality of passwords is that they are required to be oxymoronic – they need to be sufficiently random to prevent them being guessed, but they … Read more
  • internal data security breachSeptember 9, 2016

    Can You Protect Against an Internal Data Security Breach?

    Within the last 12 months, a huge number of businesses have fallen victim to an internal security breach. These have included high profile organisations as Sage Group, whose payroll processing software is estimated to be used by more than half of Britain’s businesses. Talk Talk and Morrisons followed suit, with the former losing more than 100,000 customers as a result. It is believed that business employees pose the greatest threat, having access to vast amounts of sensitive information on a … Read more
  • September 2, 2016

    The Cyber Power Index – How Does the UK Fare?

    “Cyber power is created when a complex digital information network is combined with a secure and robust physical infrastructure and developed by a skilled workforce.” computing.co.uk The Cyber Power Index, as developed by the Economist Intelligence Unit, demonstrates a country’s ability to withstand cyber attacks and to build the digital infrastructure needed for a productive economy. The Index allows us to better understand the benefits and potential challenges of cyber power. The UK is currently top in the Index with … Read more
  • IT Security Skills GapAugust 24, 2016

    The IT Security Skills Gap – Don’t Let it Impact Your Business

    There’s been talk of an IT skills shortage for years, but it’s beginning to get serious. The majority of UK CIOs – a huge 77% – are convinced that the high number of expected security threats is down to a shortage of security experts. Data breaches and abuse top the “worst fears” list for most companies, because they mean a loss of personal data and public reputation, along with a monetary loss. Infrastructure to protect against cybercrime is being invented … Read more
  • find a barristerJune 17, 2016

    New Website Makes it Easier to Find A Barrister

    Earlier this year, The Bar Council launched a brand new website which is designed to help members of the public gain access to a definitive list of barristers who they can hire for legal representation. The Direct Access Portal (DAP) gives consumers the opportunity to find a barrister directly, which will save them money in the long run. The Traditional Solicitor Route Traditionally, clients who need to find a barrister are initially required to visit a solicitor, who will then put … Read more
  • data breachMay 26, 2016

    How To Survive A Data Breach

    Data breaches within any type of organisation range from being simply an annoyance to the catastrophic kind that threaten a company’s reputation and finances. In the legal industry, there are also compliance regulations to satisfy and a data breach in the IT systems of Chambers can cost a penalty of up to £500,000. Most businesses have some sort of security measures in place to safeguard against a data breach. However, as cyber threats evolve and malware becomes ever more sophisticated … Read more
  • cloud security risksMarch 24, 2016

    Cloud Security Risks Are Rising

    As an increased number of companies migrate their systems to the cloud, the risk of having their valuable business and personal data intercepted is multiplied. Whilst cloud computing provides numerous benefits for companies, unfortunately the fact remains that businesses who hold their information in the cloud are a target for cyber criminals, ‘hacktivists’ and even competitors operating within the same industry. There have been some high profile cloud security breaches in the last few years. These include big names such … Read more
  • February 4, 2016

    Bar Council’s New Guidelines On Security Issues Of Cloud Computing

    Cloud hosting solutions provide opportunities for many businesses to enjoy reduced IT costs, improved business continuity plans and a flexible infrastructure for both remote and static employees. Yet particularly in the legal industry, cloud computing can represent a significant risk to data protection. The Bar Council has recently put together a set of guidelines which have been issued by The Information Technology Panel. These aim to keep legal firms aligned with their data protection obligations. Data Protection The Data Protection … Read more
  • it incident managementJanuary 28, 2016

    Why 24/7 IT Incident Management Is Important

    An IT network is a complex environment comprising of many different components that all need to operate like clockwork for your chambers’ systems to be both operationally effective and efficient. Business Continuity The combined systems within your IT infrastructure will likely include servers located in a dedicated server room, networked PCs, a broadband connection, UPS, backup drives, phone lines, legal applications and antivirus software packages. But what happens when one or all of these systems fail? It is of course … Read more
  • December 15, 2015

    Why Is Avaya IP Office One Of The Best-Selling Communications Out There?

    One of the hot topics in the digital industry at the moment is the ‘Internet of Things’ – that all physical objects could potentially have network connectivity. As each day goes by we live in a more and more digitally connected world and at the heart of this notion is the telecoms industry. Telecommunication is no longer purely about making phone calls. It’s also about the centralisation of many other types of communication within the telephony system. A fantastic and … Read more
  • September 8, 2015

    How Much Money Could Cloud Computing Save Your Chambers?

    “Cloud computing is not pie in the sky” IBM   Cloud computing has many benefits from your chambers. Chief among them, perhaps, is the money it’ll save you. As IBM writes, it means you can “work more efficiently and more productively, simultaneously saving money and enhancing your business and IT operations.” By consolidating IT operations and eliminating in-house servers and IT management you’ll significantly reduce your capital costs – the outlay of paying someone to run IT operations, ongoing maintenance, … Read more
  • July 21, 2015

    Why High-Speed Connectivity Matters For Lawyers…& Everyone Else Too!

    With the inevitable surge in data being streamed online and use of cloud technologies to make Chambers and its processes more efficient, your team relies more than ever on reliable, super fast internet, right? Super-fast network technologies have revolutionised the way Chambers function, and have increased output considerably. You are only as good as you connection, though. Think, for a moment, how much of your daily work would grind to a halt without an internet connection. Now think about the … Read more
  • July 6, 2015

    Why Your Chambers Still Needs Smart (& Secure) Telephony Tools

    “Work smarter, not harder” Is your telephony system complicating communications in your Chambers? In the new world of BYOD, cloud based data transfer and digital comms technology, some believe that complicated telephony systems are outdated. 38% of those between the ages of 35-50, in fact, are dissatisfied with office telephony technology. Telephony management can be complicated, and systems are now vulnerable to a growing number of security threats since the coming together of telephone and data systems. Let us explain … Read more