Blog

I don’t normally do ‘IT’ posts, but there are always news items about a new vulnerability that has surfaced, with the potential to cause significant damage to computers.

So I’m prompted to pull together a simple checklist. If you cover off these things, you ought to be confident that you have taken some steps to protect yourself, even if you do get caught in the end!

There’s no doubt that we live in a time of significant change. Technology moves along in leaps and bounds – someone told me the other day that there were several thousand iPads in use at the London 2012 Olympic Games, whereas in Beijing in 2008, there wasn’t a single one, largely because they were still a couple of years away from being released!

Of course, there are a lot more than five things to consider if you are looking at implementing a cloud computing solution. Whether you are using ‘software-as-a-service’ (that is a ready-made hosted application like an accounts package or a CRM solution) or you are building something for yourself there are, however, some key questions that keep coming up, so I thought I’d share some answers with you.