<img src="https://secure.leadforensics.com/99430.png" alt="" style="display:none;">

Blog

blog-overlay-web-saved

What will be the biggest Tech Trends of 2019 in Enterprise IT? – Part 2

Welcome to Part 2 of my Tech Trends 2019 video blog. Now I couldn't do one of these videos without ...

What will be the biggest Tech Trends of 2019 in Enterprise IT? – Part 1

Hi, I’m Mark Skelton, I’m the CTO here at OCSL (A CANCOM Company) and welcome to Part 1 of my ...

Tech Trends 2019: The Year of “Why” in IT

We are entering a truly exciting time in IT. The industry is really starting to focus on driving ...

How can Blockchain Create Greater Trust for the Enterprise?

In this second exert from our latest White Paper: Why Emerging Technologies Really Matter, TV Tech ...

Still on Citrix XenApp 6.5? It’s time to upgrade

In case you weren’t aware, as of June this year, Citrix XenApp 6.5 is now end of life and Citrix ...

Busting common myths about passwords!

Passwords are becoming increasingly important. Lots of tech companies are developing ways to make ...

How to De-Risk IoT/ IIoT with Microsoft

"Nearly 88% of C-level management said they view IoT (Internet of Things) and IIoT (Industrial ...

Getting Inside the Mind of a Hacker

In this fictitious account of a hack on Waze Banking, Security expert and Ethical Hacker, Callum ...

Windows 10 is in Demand!

The constant innovation offered in Windows 10, and the recent signing of the NHS-wide Windows 10 E5 ...

User Adoption: If you build it, will they come?

Field of Dreams, 1989: “If you build it, they will come”. This old movie adage is important to ...

A Ransomware Attack: Why you should never pay

Nowadays, it’s a sad reality, cybercrime and ransomware attacks are one of the most common threats ...

Stay informed

Stay updated and subscribe to our regular communications.