Home / Archives For Bruce Penson

Bruce Penson is Managing Director of Pro Drive IT, a provider of Managed IT Services working with businesses across London and the South East who take their IT seriously. Bruce also provides consulting services to businesses running or looking to implement Autotask – the world’s leading hosted IT business management. Often working with his peers in the IT Managed Services sector, Bruce helps IT Managed Service Providers, Software Vendors and IT departments in enterprise organisations optimise business workflow, reduce costs and gain a deep insight into the provision of their services.

Embracing The Move Towards Remote Workers

Is your workforce in the office? More and more firms are offering staff the opportunity to work remotely, whether from a home office or from co-working spaces and cafes between client appointments. This trend is often attributed to the Millennial generation demanding more flexible and agile working. In fact, the remote working trend is driven across many sectors by advances in technology, as well as changes in society and the economy. Why not reduce office overheads by having a remote workforce? After all there is no reason why your team can’t check emails, share documents, make voice and video calls and use video or teleconferencing systems if they can connect to the cloud and / or your firm’s VPN. Offering flexible and remote working has many benefits for firms. There may be cost savings...

GDPR: Is Regulation A Friend Or Foe?

For many organisations big data presents challenges and opportunities. No more so than in the financial services sector where the regulatory landscape provides an additional level of complexity. Many FS institutions are so overwhelmed by legislative requirements that they have few resources left to exploit their data for profitable ends. If your organisation feels like it’s constantly fire fighting, dealing with new regulations and ever evolving cyber threats, focused purely on protecting data – not using it proactively – you’re not alone. Regulatory compliance milestones this year include GDPR (the EU’s General Data Protection Regulation) and PSD2 – now in force – but it’s inevitable that there will be more regulatory change in the future, as a response to new cyber threats and risk...

The Hidden Menace About To Blow Your Compliance

There is a hidden gremlin lurking in the depth of your corporate IT network, both SME and enterprise, that has the capability of blowing a huge hole through your compliance work. No matter whether you are governed by an industry body such as the FCA for Financial Services markets or seeking to comply with cross industry regulation such as GDPR, this menace is putting your organisation at risk of financial penalties and damage to reputation. In the IT industry we call this threat ‘Shadow IT’ – sounds very spooky doesn’t it? So what is it? Read on to find out..,, Imagine a scenario where you need to send a presentation pack to a new investor or client. There are some lovely high-resolution images in there put together by Marketing. It’s a great presentation but unfortunately the file won’t s...

Productivity Apps: Are They Really That Productive?

I have just been to an excellent seminar on productivity – or, more specifically, how to avoid productivity ‘traps’. This subject is close to my heart because our clients are investing in new technology specifically to improve their productivity. Therefore, we are constantly updating our knowledge and analysing what we have learned so that we can see where it fits into our clients’ businesses. The single biggest message of this recent seminar was that productivity apps can, in fact, be productivity traps. Why? Because one of the biggest productivity traps of our time is the constant changing to, and evaluation of, the latest productivity apps. Companies that use too many productivity apps concurrently risk not just losing the benefit of each app, but they also risk creating a n...

Security And Social Engineering

A study by a security firm Proofpoint identified that social engineering was the top cyber attack technique in 2015. Instead of focusing on automated attacks as in previous years, attackers are getting you, or your employees, to do their dirty work. If you think your staff and senior management team are that not that gullible, think again. Social engineering is a sophisticated security threat that even the most security conscious have been tricked by. What Is Social Engineering? Social engineering starts with engagement between the attacker and the ‘victim’ via social media, email, or mobile apps. The aim is to get the target to carry out an action that allows the attackers to infect IT systems, steal data or transfer money. While automated security attacks are a blanket approach to breach...

1 2