Blog
LastPass: Bridging the Gap in the Passwordless Journey
LastPass is like a digital safe for all your passwords. It locks away your login details and keeps them handy for when you need them. It's smart because it uses tough encryption to keep things secure.. Why LastPass Matters: - Centralised Security: LastPass keeps all...
Enhancing Security with RSA SecurID: A Dynamic Authentication Solution
The fourth part in our Authentication series explores RSA SecurID and its impact on dynamic authentication landscapes. As we delve deeper into diverse authentication technologies, RSA SecurID demonstrates how scalable, two-factor solutions can provide...
The Future of Email Security Event with YCSC, ITogether & Check Point
📅 Date: Wednesday 12 June 2024🕒 Time: 12pm to 4pm📍Location: Restaurant Bar & Grill, City Square, Leeds LS1 2ES ➡️ Email is the cornerstone of business communication. ➡️ It is also one of the primary targets for cyber attack. ➡️ Are...
Safeguarding Public Health Information with Two Factor Authentication
In our third article of our blog series "Unlocking Security: The Future of Authentication," we address the critical role of Two-Factor Authentication (2FA) in protecting Personal Health Information (PHI). Building on the security frameworks discussed earlier, such as...
YubiKey: The Key to Robust Hardware-Based Authentication
Continuing our series on the future of authentication, this article focuses on YubiKey, a pivotal tool in the transition towards passwordless security solutions. As we explore the functionalities and benefits of YubiKey, we understand its role in reducing dependency...
Understanding Public Key Infrastructure (PKI): Securing Digital Communications
In the first instalment of our blog series "The Future of Authentication," we dive into the essentials of Public Key Infrastructure (PKI). As the backbone of secure digital communication, understanding PKI is crucial for any organisation aiming to safeguard its data...
Vendor Spotlight: Portnox – Simplifying Network Security
Simplifying Network Security with Portnox We like network security solutions that are not only comprehensive, but also straightforward to deploy and manage. This month, our Vendor Spotlight shines on Portnox, a leader in the network access control and...
New Partner! Keepnet Labs: Protect your Employees against Social Engineering Techniques
We're thrilled to announce our new partnership with Keepnet Labs. In a world where cyber threats are constantly evolving, Keepnet Labs gives you the edge offering a blend of advanced phishing protection plus real-time threat intelligence. Here’s the...
Fortinet or Check Point?
In recent cybersecurity news, vulnerabilities in Fortinet's FortiOS and FortiProxy systems have been exposed, leaving approximately 150,000 systems vulnerable to exploitation. This critical security issue, known as CVE-2024-21762, allows attackers to execute code...
Blog: Boosting Website Speed & Performance with Akamai: What It Means for You
In a world where waiting more than two seconds for a website to load feels like an eternity, speed is king. Akamai, a leading edge computing platform, is a major player in enhancing website performance through its Content Delivery Network (CDN). But what makes...
Navigating Cyber Threat 2024: Ethical Hacking
In the fast-paced world of cybersecurity, malicious actors continuously devise new methods to breach and compromise digital assets. The fallout from these malicious activities can be hefty, often resulting in significant financial and reputational damage. Here at...
YCSC, ITogether and Recorded Future Event
🔓 Are you overestimating your MFA’s effectiveness?🔓 Has MFA kept pace with the latest cyber threats?🔓 Is your MFA solution bulletproof?These are all topics we’ll be discussing at our event:Protecting Your Identity: Is Multi-Factor Authentication Enough?Hosted by...
Understanding the Technical Nuances of Check Point Harmony Email and Collaboration
In the realm of IT and network security, safeguarding email and collaboration platforms is paramount. With the increasing sophistication of cyber threats, it's crucial to employ solutions that not only protect but also integrate seamlessly with existing systems. This...
ITogether is excited to partner Recorded Future to provide Evidence-Based Threat Intelligence
ITogether are excited to announce our latest vendor partnership with Recorded Future. Recorded Future provide ITogether managed service customers with the world’s most advanced cyber threat intelligence and advanced security analytics.Recorded Future focuses on...
Why the Education Sector needs more than Office 365 for Data Backup and Recovery
In the evolving landscape of public cloud-based learning, protecting your data within Microsoft Office 365 environments has never been more crucial.With 47% of senior IT leaders in schools experiencing ransomware threats, the necessity for robust ransomware...
Protect Against Cyber Attack with Security Awareness Training
Your employees are the weak link in your network security? Did you know that? In fact, 91% of successful data breaches started with a targeted spear phishing or ransomware attack. Here at ITogether, we recommend KnowBe4, the world’s largest Security...
Network Security Essentials: Your Must-Have Checklist
In the dynamic world of network security, embracing cloud-based solutions is not just a trend, it’s a necessity. The good news is we’re here to help with our straightforward Network Security Essentials Checklist: Secure Web Gateway (SWG)What It Does: Ensures safe...
YCSC, ITogether and KnowBe4 event
ITogether Announces Strategic Partnership with Yorkshire Cyber Security Cluster.ITogether, a leader in Network and Security solutions, is thrilled to announce a strategic partnership with Yorkshire Cyber Security Cluster (YCSC), a membership organisation committed to...


















