![](/assets/Uploads/pages/news-list-page/1900x720-3__FillWzE5MjAsNTAwXQ.png)
News & Insights
Filters 0 of 21 selected Reset and show all
Latest Insights
![IOM Gov logo](/assets/Uploads/services/IOM_Gov_logo__FillWzM2MCwyMDNd.jpg)
Sure to provide WAN connection for Isle of Man Government
Sure has been awarded a second significant contract from the Isle of Man Government, following a competitive tender process, for Managed Wide Area Network (WAN). The contract win follows Sure recently being appointed as sole provider for government internet services.
![Security blue print linkedin image](/assets/Uploads/MAP-IMAGE-2-v2__FillWzM2MCwyMDNd.png)
Your Cybersecurity Protection Blueprint
With cyber security breaches at epidemic proportions and governments across the globe actively encouraging greater awareness and action, we’ve taken a look at the ‘Essential 9’ focus areas that form a blueprint for Security Risk Management.
![Human firewall Linkedin Image](/assets/Uploads/Human-firewall-Linkedin-Image__FillWzM2MCwyMDNd.png)
The Emergence of the Human Firewall
When the causes of cybercrime incidents are investigated, the same underlying reason crops up time and time again … Human Error.
![Small L R Deputy Mark Helyar Deputy Neil Inder Deputy Sasha Kazantseva Miller Deputy Peter Ferbrache Alistair Beak Sure CEO Deputy Bob Murray Justin Bellinger Sure Guernsey Chief Executive](/assets/Uploads/Press-Centre/Images/cybersecurity-v2__FillWzM2MCwyMDNd.jpg)
Sure to make major investment in Guernsey Fibre Broadband for all
Sure is rolling out a state-of-the-art fibre to the premises (FTTP) broadband network, which will directly reach every property in Guernsey with a faster, more reliable connection and offer the possibility of 1 gigabit-per-second coverage for all.
![Security 1 List Portrait](/assets/Uploads/pages/news-list-page/Security-1-List-Portrait__FillWzM2MCw1MTFd.jpg)
Devastating Consequences of a Security Breach
Our Cloud, Security, and data expert Malcolm Mason highlights the devastating consequences of a security breach and the importance to every business to understand the risks.
![Security 2 List portrait](/assets/Uploads/pages/news-list-page/Security-2-List-portrait__FillWzM2MCw1MTFd.jpg)
The 9 Top Cyber Attack Techniques & Vulnerabilities
Understanding the main attack methods and areas of vulnerability help organisations to improve levels of protection and business continuity, find out more...
![Future of cloud list image](/assets/Uploads/services/1900x720-4__FillWzM2MCwyMDNd.png)
The Future of Cloud
Discover what the latest developments in Cloud infrastructure mean for the future of IT Solutions