The Babble Blog

Get expert advice, valuable insights, and practical tips to help small and medium-size businesses like yours unlock the full potential of cloud technology.

babble-subscribe

Never miss an article again

Subscribe to our blog updates and get the latest articles delivered right into your inbox.

How Shadow IT Breaches Your Defences
This is an image of a man working at a desk with three monitors in front of him.

How Shadow IT Breaches Your Defences

Uncover hidden security breaches, compliance issues, and unexpected costs. Learn how to identify and mitigate shadow IT for a secure IT infrastructure.

Feb 03 2025
Is My Cyber Security Tech Enough?
This is an image of a monitor in a data room.

Is My Cyber Security Tech Enough?

Is your cyber security tech enough to withstand an advanced cyber attack? Firewalls, antivirus software, but are they enough?

Jan 31 2025
EDR vs. MDR vs. XDR: A Comprehensive Comparison
This is an image of cyber security technology.

EDR vs. MDR vs. XDR: A Comprehensive Comparison

A detailed comparison of the three main threat detection and response solutions; EDR vs. MDR vs. XDR.

Jan 29 2025
The Hybrid Approach to Cyber Security
This is an image of a man's face with code being reflected on it.

The Hybrid Approach to Cyber Security

Discover the pros of a hybrid approach to cyber security, balancing in-house resources with managed services for optimal protection and cost-effectiveness.

Jan 27 2025
Internal vs. Outsourced Cyber Security (Cyber Security as a Service)
This is an image of two men working at a desk.

Internal vs. Outsourced Cyber Security (Cyber Security as a Service)

Discover the pros, cons, and key considerations to help you decide. Plus, learn about the hybrid approach!

Jan 24 2025
The 5 Essential Security Tools Your SMB Needs to Have
This is an image of cyber security equipment.

The 5 Essential Security Tools Your SMB Needs to Have

Is your SMB cyber secure? Find out with our list of 5 essential security tools.

Jan 22 2025
What Goes into a Cyber Security Budget?
This is an image of a man counting money at his desk.

What Goes into a Cyber Security Budget?

Learn how to allocate 15-20% of your IT budget effectively across people, devices, and places to avoid costly breaches.

Jan 20 2025
Traditional vs. Human Risk Management
This is an image of people working in an office at a shared desk.

Traditional vs. Human Risk Management

Discover why traditional cyber security training falls short & how Mimecast's Human Risk Management can better protect your organisation from human error.

Dec 04 2024
What Did Microsoft Ignite 2024 Reveal About the Future of Work?

What Did Microsoft Ignite 2024 Reveal About the Future of Work?

Discover how Microsoft Ignite 2024 unveiled AI-powered tools, security enhancements, and hybrid work solutions shaping the future of modern work.

Nov 26 2024
Customer Interview: John Underwood – The Power of Passion in Tech
This is an image of a man pointing to a graph on a screen.

Customer Interview: John Underwood – The Power of Passion in Tech

Want to be an IT leader? John Underwood shares his journey & wisdom. Learn about people-first tech at Cirencester Friendly.

Nov 18 2024
How Can AI Supercharge Your Contact Centre?
This is image of two call centre agents sitting at their desks.

How Can AI Supercharge Your Contact Centre?

Discover how AI can supercharge your CX workforce. Learn how to boost agent efficiency, automate tedious tasks, and deliver exceptional service.

Nov 13 2024
Can CRM Integration Really Enhance Customer Experience?
This is an image of call centre agents standing in a row and smiling at the camera.

Can CRM Integration Really Enhance Customer Experience?

Discover how integrating your CRM with Five9 can transform your customer experience by improving agent efficiency and leveraging real-time customer data.

Nov 11 2024