The Trustco Post

The latest news from Trustco, tech, IT and all that good stuff.
Featured image for “Passwords, Passkeys and Quantum Computing: The Saga of Logging In”

Passwords, Passkeys and Quantum Computing: The Saga of Logging In

Posted 19/03/2025 by Michelle Cope
◦ Traditional passwords are becoming less secure due to poor user habits and cyber threats. ◦ Multi-Factor Authentication (MFA) improves...
read more
Featured image for “A 6-Minute Guide To On-Premises AI”

A 6-Minute Guide To On-Premises AI

Posted 10/03/2025 by Tim Cripps
• On-premises AI runs on an organisation’s own hardware instead of cloud-based infrastructure. • Businesses are considering on-prem AI due to data...
read more
Featured image for “Immutable Backups: Your Best Defence Against Ransomware”

Immutable Backups: Your Best Defence Against Ransomware

Posted 22/01/2025 by Michelle Cope
⦿ Discover why ransomware is one of the biggest threats to businesses today. ⦿ Understand the limitations of traditional backup...
read more
Featured image for “Countdown: The Top 10 UK Cyber Attacks of 2024”

Countdown: The Top 10 UK Cyber Attacks of 2024

Posted 20/01/2025 by Michelle Cope
⦾ High-profile cyber breaches rocked organisations, from the Ministry of Defence to cultural institutions like the British Library. ⦾ AI-powered...
read more
Featured image for “ISO 27001 for Small Businesses: How to Meet Cyber Security Requirements”

ISO 27001 for Small Businesses: How to Meet Cyber Security Requirements

Posted 01/11/2024 by Michelle Cope
Discover key steps for ISO/IEC 27001 certification, including risk assessments, security policies, access controls, and training to strengthen your small...
read more
Featured image for “Save Thousands: NHS Cyber Resilience with Fixed-Price Incident Response”

Save Thousands: NHS Cyber Resilience with Fixed-Price Incident Response

Posted 25/10/2024 by Michelle Cope
Explore the benefits of a fixed-price incident response plan for NHS Trusts. Learn how integrated cyber security measures protect sensitive...
read more
Featured image for “Improving Cyber Security in the NHS: Why Microsoft Sentinel and Arctic Wolf’s Proactive Support Work Best Together”

Improving Cyber Security in the NHS: Why Microsoft Sentinel and Arctic Wolf’s Proactive Support Work Best Together

Posted 23/10/2024 by Michelle Cope
Discover how Microsoft Sentinel’s automation and Arctic Wolf’s human-led Managed Detection and Response (MDR) protect the NHS from growing cybersecurity...
read more
Featured image for “Amplifying Cyber Resilience with Zero Trust Architecture (ZTA)”

Amplifying Cyber Resilience with Zero Trust Architecture (ZTA)

Posted 02/08/2024 by Michelle Cope
Zero Trust Architecture (ZTA) in cybersecurity provides a framework to bolster security by removing the assumption that everything within a...
read more
Featured image for “Cracking the Code: Tackling Alert Fatigue with Data-Led Insights ”

Cracking the Code: Tackling Alert Fatigue with Data-Led Insights 

Posted 10/07/2024 by Michelle Cope
Alert fatigue can lead to several serious consequences, learn how to take proactive action to tackle it....
read more
Featured image for “The Power of EDR and XDR Tools in Cybersecurity for Hunting, Investigating, and Responding to Attacks”

The Power of EDR and XDR Tools in Cybersecurity for Hunting, Investigating, and Responding to Attacks

Posted 04/07/2024 by Michelle Cope
Explore how Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) tools enhance your cybersecurity strategies....
read more