Skip to main content
Andrew Quinn
Written byAndrew Quinn
Managed IT Service

Physical Hosting vs Virtual Hosting

When selecting server hosting, the first question many organisations face is whether to opt for physical or virtual hosting. Both have their unique advantages and trade-offs. 

Liam Potter Headshot
Written byLiam Potter
Business Consulting

Infrastructure Monitoring Best Practices

When it comes to monitoring your infrastructure, it’s essential that all your bases are covered to ensure that none of your critical business services are impacted. Within Waterstons we use a tool…

Lee Foster
Written byLee Foster

What is vCIO and what are the benefits?

A Virtual Chief Information Officer (vCIO) is like having an IT expert in your corner—without the cost of a full-time exec. They provide strategic tech guidance on a flexible, part-time basis,…

Vincent Sharp
Written byVincent Sharp

Windows Modern Management

With Microsoft closing the chapter on Windows 10 in October…

Simon Evans Headshot
Written bySimon Evans

What is physical penetration testing and how can it help my business?

Physical penetration testing is a method used to assess the security processes and protocols of an organisation. It involves evaluating the effectiveness of physical security controls and staff…

Vincent Sharp
Written byVincent Sharp
Modern Workplace

Closing the chapter on Windows 10 and upgrading to Windows 11

Once upon a time, Microsoft promised that Windows 10 would be ‘the last version of Windows’ but alas, it was not to be.  October 14, 2025 marks the end of Windows 10 support, meaning…

Callum Headshot
Written byCallum Lake
Cyber Security, Cyber Security Strategy

The dangers of deepfakes

With the rise in use of Artificial Intelligence across all areas of life, there has also been a rise in its malicious usage.

Sean Brown
Written bySean-Francis Brown
Cyber Security, Cyber Security Strategy

Critical vulnerabilities in remote access tools expose industrial networks to cyber threats

Claroty’s Team82 recently discovered a critical vulnerability in industrial networks: the widespread use of insecure remote access tools (RATs) in Industrial Control Systems (ICS) and Operational…