Our site uses cookies to make it work and to help us give you the best possible user experience. By using our site, you agree to our use of cookies. To find out more about cookies and how you can disable them, please read our cookies statement. 

Cookie Settings

You can manage your cookie settings by turning cookies on and off.

Click on the different cookie  headings to find out more about the types of cookies we use on this site and to change your settings. Please be aware that if you choose to turn off  cookies, certain areas of our site may not work and your browsing experience may be impacted.

For further information on how we use cookies, please see our cookies statement. 

Strictly Necessary Cookies

(Req)

These cookies are essential for the technical operation of and proper functioning of our site  and enable you to register and login, to easily move around our site, and to access secure areas. Without these cookies our site won't function properly.  

These cookies are required

Performance Cookies

Performance cookies allow us to collect aggregated and anonymous data on how our site is used, such as the number of visitors to our site, how you navigate around and the time spent on our site and also to identify any errors in functionality. These cookies also help us to improve the way our site works by ensuring that you can find what you’re looking for easily, to better understand what you are interested in and to measure the effectiveness of the content of our site. 

Marketing Cookies

These cookies allow us to advertise our products to you and allow us to pass this information on to our trusted third parties so that they can advertise our products to you on our behalf. All information these cookies collect is aggregated and therefore anonymous. No personal information is shared to third parties. Any personal information collected while using our website could be used for direct marketing from Dimension Data only.

Dimension Data Blog

Latest
Blog

Your digital future: what's holding your business back?

Digital transformation has defined the CIO’s priorities recently. We hear it often, but the disruption of old business models still affects almost every market.

Read blog
Featured
Blog

Navigating compliance while your data scales

Hybrid storage models including managed storage are essential in ensuring compliance and scale in an age of increasing regulation.

Read blog
Blog

Eyes wide open: Raising cybersecurity's profile in your business

Our 2017 Global Threat Intelligence Report showed that, year on year, 11% more businesses were improving their incident response ability. But 68% still had no formal incident response plan.

Read blog
Blog

What you need to know about Intel processor design flaw

The IT world is racing to patch their systems after two major vulnerabilities in Intel, ARM and AMD processing chips have been announced – affecting almost all computers and systems.

Read blog
Blog

Holiday-time and cybercrime – it's the season to be vigilant

Today, online shopping is the preferred method of buying goods for millions of consumers. By 2021, over 2.14 billion people worldwide are expected to buy goods and services online.

Read blog
Blog

Bad Rabbit ransomware: cybercrime continues its exponential rise in 2017

“Bad Rabbit” is the latest ransomware attack to hit organisations, having affected numerous major businesses across Russia, Ukraine, Turkey and Germany as of October 24th.

Read blog
Blog

Top IT Trends to watch in 2018: Be prepared to take advantage of digital's opportunities

As the new year fast approaches, it’s time to think of how your business can continue to remain one step ahead by looking at the IT trends shaping your industry.

Read blog
Blog

Using the dark web to predict and protect against Ransomware

Ransomware attacks have recently emerged as the prominent cybersecurity threat. While this year’s high profile WannaCry and Petya ransomware attacks grabbed the headlines, the threat has been evolving for decades,

Read blog
Blog

Organisations continue to fight the good fight against cybercrime but how are they faring?

It is one of the most comprehensive study of its kind, offering insights into the latest cybercrime trends, and guidance on how to avoid falling victim to them.

Read blog
Blog

The wolf in sheep's clothing: business email compromise and what you need to know

When an email comes from a member of your organisation’s leadership team (such as the CFO, for example) requesting certain actions be taken, would your staff question its validity?

Read blog

Recent tweets