The Amazing Blog

What do major companies like Ford, Google and Apple have in common besides being global brands? Billions of dollars in revenue probably comes to mind, but the willingness to outsource is another shared feature and what we'll be examining in this article. If brands that have...

“Meltdown” & “Spectre” Vulnerability Update   We are aware of the two recently discovered CPU (processor) vulnerabilities, currently named Meltdown and Spectre. These vulnerabilities affect most modern processors (including Intel and AMD) and allows unauthorised access to privileged system memory. At this point, there are no known exploits of this vulnerability and it...

Opening days and times during Xmas/New Year: We are open on 22nd (9am to 1pm only) 27th, 28th, 29th (9am to 1pm only) December 2017 where our Service Level Agreement (SLA) applies. We are closed on all other days and our office will re-open again on 2nd...

If you believe that IT security is reserved for really big companies with umpteen plus employees and a dedicated IT team, you are sadly mistaken and your systems could likely be very exposed. Not to mention with the GDPR (General Data Protection Regulations) now less...

If you missed part 1 & 2 on our series about HM Cyber Essentials, you can read those here and here.   Part 3 - The 10 Steps to Cyber Security Step 1 explains why an information risk management regime is central to an organisation's overall cyber security...

Amazing Support answers the CompTIA Cyber Essentials Pledge and raises the standard of the IT and IT security industry by achieving the HM Government Cyber Essentials certification. Amazing Support pledged to the CompTIA UK member and partner community conference in June 2017 in Liverpool that they would...