<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=156961&amp;fmt=gif">

Mirus IT Solutions News

What is Penetration Testing?

What is Penetration Testing?

It seems unthinkable: asking an outsider to break your cyber security and demonstrate just how easily they can rifle through your systems. Yet penetration testing, or pen-testing, as it’s otherwise known, might be the most important IT security ...
Transform and Protect Your Charity with Managed Services

Transform and Protect Your Charity with Managed Services

Charity, as they say, begins at home. So for any non-profit organisation, it makes sense to have that home as powerful and proficient as possible. Now more than ever, it’s time for the charity sector to kick-start a much-needed digital ...
Manufacturing Success: How Managed Services Support the Manufacturing Industry

Manufacturing Success: How Managed Services Support the Manufacturing Industry

If there’s one thing manufacturers rely on, it’s consistency; keeping systems operational, processes streamlined and output optimal. How does a complete company IT solution help grease the wheels of industry?
Could You Unify Your Company Tech With Just a Single Provider?

Could You Unify Your Company Tech With Just a Single Provider?

If 2020 and Covid19 has taught us anything, it’s that the modern business needs expansive, simplified technical solutions to adapt to the unexpected. But with such a broad selection of technologies to maintain, can a single point of contact be ...
Guest Blog: Dr. Laura Marulanda-Carter PhD Remote Teaching and Working – A Veiled Opportunity to Thrive?

Guest Blog: Dr. Laura Marulanda-Carter PhD Remote Teaching and Working – A Veiled Opportunity to Thrive?

We’re proud to present another new entry from our regular guest blogger, Dr. Laura Marulanda-Carter, to the Mirus blog! Here, Dr. Marulanda-Carter PhD reflects on the growth of Remote Working – and how it may well shape the future of work and ...
How Long Would It Take You to Identify a Data Breach?

How Long Would It Take You to Identify a Data Breach?

In May this year, GoDaddy discovered it had suffered a data breach affecting 28,000 accounts - yet the breach itself had happened much earlier, in October 2019. The world’s largest domain registry service had been hacked; and for half a year, they ...
Working Remotely? Here’s How to Keep Devices Safe and Secure

Working Remotely? Here’s How to Keep Devices Safe and Secure

Your devices might be under lock and key while you’re working from home, but that doesn’t mean their connections are. Here’s why remote working needs strong protective solutions – and how to implement those protections effectively.
Phishing in the Dark: Why Your Data is Stolen and Sold

Phishing in the Dark: Why Your Data is Stolen and Sold

For something we can’t hold, can’t watch in action and rarely even see ourselves, we certainly place a lot of importance on our personal data. Yet the value of yours and your business’ can’t be overstated – not least with so many cyber criminals ...
Guest Blog: Dr. Laura Marulanda-Carter PhD You don’t WannaCry anymore!

Guest Blog: Dr. Laura Marulanda-Carter PhD You don’t WannaCry anymore!

We’re proud to once again welcome our regular guest contributor, Dr. Laura Marulanda-Carter, to the Mirus blog! In this latest entry, Dr Marulanda-Carter asks; why do ransomware attacks continue to topple major businesses?  With our legs stretched ...
How Much Further Can You Take Your Managed Print?

How Much Further Can You Take Your Managed Print?

Well, the stats are in and it seems that the benefits of a Managed Print setup are no mystery to business owners worldwide. According to a report from Quocirca, 79% of businesses worldwide foresee extra spending on their Managed Print setup – some ...
Top Tips for Safer Internet Day 2020

Top Tips for Safer Internet Day 2020

The 11th February sees the return of the Safer Internet Centre’s ‘Safer Internet Day’, an initiative encouraging youngsters to practice safer internet use and protect them from cyberbullying, social media abuse and threats to their security.   As ...