This isn’t Mordor and so there isn’t one ring to rule them all!

Posted on Leave a commentPosted in Uncategorized

Fine grained password management policies and active directory Introduction It’s very easy to shout polarised views out there, especially when it comes to people giving out advice on password good practises! We’ve seen all manner of craziness again in the last few weeks on the internet about people claiming password managers aren’t safe and can’t […]

Case Study: Service Rationalisation and Migration to Cloud Provider

Posted on Leave a commentPosted in Cloud, ITSM, Transformation

Challenge: An old and fragile infrastructure preventing an urgent need to improve services to the business.   Client: Royal College of Physicians Revenue:£40 Million+ Employees:450+ Servers:150+   Overview In January 2016 XServus was engaged by the Royal College of Physicians to resolve a number of complex issues around the state of the IT infrastructure. A majority of […]

Cyber Security Audit

Case Study: Cyber Security Audit for A Major UK Healthcare Provider

Posted on Leave a commentPosted in Security

The Challenge:  “A lack of visibility and maturity around cyber security across the organisation”   Overview In January 2016 XServus was engaged by the organisation to carry out a full cyber security assessment of the organisation. The wanted to gain a full understanding and oversight of its vulnerabilities and then develop a road map for […]

Cyber security Attacker

2017 major cyber security attacks and how they could have been avoided

Posted on Leave a commentPosted in Security

It’s the start of the year (2018), so what better time to review some of the major cyber security incidents of 2017 and see what we can learn about defending against attacks in 2018. You may have noticed that newsworthy cyber security attacks have been saturating the media. These attacks have caused more damage than most of […]

WannaCry Ransomware Guidance (fast publish)

Posted on Leave a commentPosted in Security

I’m currently working with a client at a ~5,000 seat site to combat a WannaCry ransomware outbreak. I’ve put together some draft high level information on the malware, mitigation strategies and high level removal guidance. It’s really rough at the minute (I’ve been helping recover services, conducting vulnerability scans, configuring honeytraps, collecting samples, setting up sinkholes […]

The impact of moving to converged or hyper-converged infrastructure

Posted on Leave a commentPosted in Optimisation, Transformation

In the world of information technology we can often get caught up with performance specifications, technical wizardry and the latest ‘must have’ solution. In our latest blog we look at the how changes at the technical architecture layer can have far wider reaching implications on people. Click the download icon below to read our latest […]

The anatomy of designing resilience, recoverability and contingency into technology services

Posted on Leave a commentPosted in Education, Leadership

Retrofitting services with availability and disaster recovery can be a challenging tasks and often compromises have to be made. Here we look into the anatomy of designing services with these capabilities in mind to ensure IT and business value are aligned. As we know, a well designed solution is simpler to operate, has better ROI and […]