Blog

5 ways for CISOs to bridge the cyber security skills gap

The cyber security skills gap is putting pressure on CISOs in all industries. Demand for professionals with the right qualifications is currently outstripping supply by 3:1. As a CISO, this means that you’re not only flying the plane, you’re having to navigate it, too. Given the extremely agile nature of cyber security, it’s unsurprising to… Read more…

Identity management tools: Key software for modern IAM

Identity and access management (IAM) is becoming increasingly important in today’s mobile-first, cloud-first world, and it’s crucial you choose the right identity management tools to meet the growing demands on your business. With new regulations and evolving cyber threats, an out of date IAM strategy and inadequate systems can put your business at risk. With… Read more…

Data security in the cloud: Key steps to protecting your information

Are you keen to fully migrate to the cloud and offer your workforce more productive mobile working opportunities, but concerned about the risks to your data security? If so, you’re certainly not alone. With employees largely unaware of best practice for using unsecured SaaS apps, and compliance requirements becoming more urgent by the day in… Read more…

8 Cyber Security Cliches That Help No One

Cyber security is fundamental in today’s online environment, but its public face is chock full of scary images and statistics used to instil fear. Here are eight unhelpful cyber security cliches, and why you should take the time to get educated rather than intimidated.   The fear, uncertainty and doubt of cyber security 1. It’s… Read more…

FIM to MIM Migration: What You Need to Know

Forefront Identity Manager (FIM) will soon be out of support. What does that mean for organisations who rely on the system to manage users’ digital identities and credentials? Now that withdrawal of mainstream support has been announced, FIM to MIM migration has gone from being a recommended course of action to an essential one. Here’s… Read more…

How to Set Up and Run Rule Extension Unit Tests in MIM

After reading this blog, you will have the knowledge to be able to set up and run your own rule extension unit tests. This will help you develop solutions quicker, and do so to a higher quality. In the last blog in this identity management testing series, we looked at some of the issues with… Read more…

Conwy Cannons: Season in Review

The curtain has come down on a tough first season for Conwy Cannons basketball team, sponsored by Oxford Computer Group. Competing in the North Wales Basketball Association U16 league, the team has enjoyed great success while finding their feet against more established competition.   A CLOSE FINISH In recent weeks, the Cannons narrowly lost out… Read more…

Microsoft SPE: E3 or E5?

When it comes to deciding which Secure Productive Enterprise* (SPE) license fits your organisation best, there’s a lot of information to process. As you will be able to tell if you’ve read our guide to Secure Productive Enterprise licensing, SPE contains a lot of technology. Here we’ll make it easier for you to confidently make a… Read more…

10 Questions to Ask Your IT Department about Mobility

Mobile is a critical or high priority for almost two thirds (64%) of organisations, according to IDG research. And why wouldn’t it be? Mobility not only enables increased productivity; it also opens the door to real business transformation. Specifically, the IDG research indicates that the most significant factors behind mobile investment are: Improving internal communication… Read more…

A Guide to Secure Productive Enterprise Licensing

Get answers to the most common Microsoft Secure Productive Enterprise* (SPE) licensing questions. Uncover the value of what SPE can bring to your organisation. At OCG, we speak to many organisations looking to harness the benefits of cloud and mobile solutions to release their workforce from the shackles of the past. Solutions that enable employees to… Read more…