search.noResults

search.searching

dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
ACS Offi ce Solutions


“By 2022, 60% of large and global enterprises, and 90% of midsize enterprises (MSEs), will implement passwordless methods in more than 50% of use cases, which is an increase from fewer than 5% today.”


Cyber security in the post-COVID business


Stephen Harley Presales Director at ACS Offi ce Solutions


The challenges of keeping business cyber secure has evolved dramatically and as we accelerate and change the way we use IT; businesses must adopt a 360-degree approach to protecting data, the organisation, and its people from these challenges. T e old way of do- ing things or ‘a minimum viable defence’ approach is unsustainable in 2020. In July 2019, ACS commissioned YouGov to conduct our fi rst Agile


Working survey, one question being ‘how often do you work from home?’ 48% of the UK workforce said that they never worked from home, with only 22% working from home once a week or more. T e ONS survey in April 2020 showed an increase of 46.6% of the


workforce now working from home, with 86% of those doing so due to COVID. As lockdown restrictions evolve many more people are returning to offi ces, but even then, a mix of home and offi ce-based attendance is likely. In March, businesses rapidly adopted more remote working solu-


tions, issuing laptops and collaboration tools on mass. Understandably, less concerned about security than being able to continue to operate. What this means is that right now we have workforces operating


in new locations, potentially outside the easy reach of IT teams using unfamiliar systems that may not have been confi gured and selected as robustly they might otherwise have been. When somebody is setting up a video conference call for a sensitive meeting, is that call being confi gured in a secure way? Are there steps


68 ALL THINGS BUSINESS


in place to prevent unauthorised participants join- ing? What about the content shared and created in those calls? Where is it stored and who has access to it? How are we managing data? Have we granted home workers the option to bring their own device? How do we know that device is secure? Are people using personal email accounts for confidential business? Do they have multi-factor authentication on those accounts? T e threats are increasingly sophisticated, so


business requires a sophisticated cyber resilience strategy. T is isn’t just about preventing a breach but also having the capability to quickly recover should a breach occur.


Security as a Service T e ACS security portfolio isn’t just a list of products that we provide under the banner of ‘security’, but a carefully curated roadmap that allows businesses to progressively improve their security stance in an integrated and thought-out way. Our Security as a Service off ering means that


having a mature, highly sophisticated cyber-secu- rity strategy doesn’t require the mega-budgets of large enterprise organisations but can be delivered at an aff ordable per-user-per-month basis. And when it comes to recovering from a disas-


ter if the worst should happen, ACS in partnership with our sister company Datastore 365 have been building Disaster Recovery as a Service solutions for almost a decade.


For more information contact ACS Offi ce Solutions on 01604 704000 or visit www.acs365.co.uk


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68  |  Page 69  |  Page 70  |  Page 71  |  Page 72  |  Page 73  |  Page 74  |  Page 75  |  Page 76