Quick Job Application

In a rush? Simply drop off your CV by clicking on the button to your right, and we'll get in contact if we have a suitable vacancy.

IT Security and Cloud Snapshot: May 2019

It’s been an eventful month for IT security and cloud, from Microsoft’s huge cloud success to new cybersecurity laws on the IoT.

For your convenience, the Technology team at First have broken down the endless list of talking points into a handful of articles and topics that we feel you shouldn’t miss. Take a look at our latest snapshot, insights and handy resources below.


Industry News

Azure launches Microsoft to $1 trillion market share status

They’ve done it! Microsoft has reached a $1 trillion market cap after it’s cloud computing service Azure experiences revenue growth of 73%.

Read more


Internet of Things Image

Government unveils new cybersecurity laws for IoT devices

UK Government has revealed IoT proposals that would introduce security labelling to internet-connected devices.

Read more


IT Security insights

Password Managers

Are Password Managers the Future of Improved Cybersecurity?

We explore the implications of the Facebook breach that exposed the login details of up to 600 million users, asking if a new alternative to password security is needed to protect our data.

Read more


Remote worker on a lie low in the sea

The IT Security Risks of Remote Working

With contractors and remote workers working often across the globe for their business, our First Technology team discuss the security risks involved when remote workers become back of your IT infrastructure.

Read more


Multi-Factor AuthenticationMulti-Factor Authentication – A Step Too Far?

In honor of this year's World Password day, our I.T Business Manager Kevin Riley explored the benefits of adopting two-step authentication and discussed the possible pitfalls that these measure can recreate.

Read Kevin's thoughts here


Unmissable Resource

Threatpost image

Threatpost webinar: Data security in the cloud

In this hour-long webinar recording, cloud experts from Jim Reavis (Netskope) and Sean Cordero (Cloud Security Alliance) join Threatpost senior editor Tara Seals, to discuss how to lock down data when the traditional network perimeter is no longer in place.
Key lessons included in this webinar:

  • How the adoption of cloud services presents new IT security challenges
  • Ideas and best practices for locking down this new architecture
  • Whether managed or in-house security is the way to go

Click here to view the full webinar recording

Testimonials

Help us with our survey
Do you feel the jobs market has picked up?