Call Sales: 0845 470 4001Call Support: 0800 130 3365 | Support Portal Login

Vodafone blackout highlights urgent need to optimise the security and resilience of critical infrastructure

Vodafone-Outage_BlogHeader

On Monday 13th October, Vodafone customers experienced a blackout of internet and mobile services, with more than 130,000 reports flagged to web outage monitors. In many cases, business users reported they had been left unable to trade, or even communicate with colleagues or customers, throughout the outage, leading to a demonstrable loss of profits. This included other telecoms providers utilising Vodafone's network, who were similarly affected.

  166 Hits

The best of all worlds: embracing the BYOD model without putting critical data at risk

The best of all worlds: embracing the BYOD model without putting critical data at risk

In just a few short years, the way we work has changed forever, with employees at all levels now working at home, in the office, and on the move, communicating and collaborating with customers and colleagues in ways that would have previously been inconceivable. However, as we have seen in recent months, with numerous high-profile cyber-attacks on corporate infrastructure, we can never allow ourselves to become complacent when it comes to the security of critical data. In other words, while we should certainly be ready to explore new models of working, the opportunities on offer must not blind us to potential cyber risks.

Let's consider, for example, the now ubiquitous Bring Your Own Device (BYOD) model…

The BYOD model simply means employees are allowed to utilise whichever devices they like for work purposes, utilising them to connect to corporate networks in and out of the office. While this concept has existed for some years now, the COVID-19 pandemic and the resulting lockdowns saw numerous organisations rush to implement the concept at scale, ensuring their employees could transition to remote working with minimal disruption.

While this was largely successful in terms of maintaining BAU as much as possible, in the years since lockdown, many organisations have found that these hastily implemented policies have introduced a number of challenges – some obvious, some less so – for internal IT teams.

These include:

  • Allowing employees the freedom to use their preferred devices without compromising the integrity of corporate infrastructure  
  • Ensuring users' personal data is not inadvertently put at risk
  • Maintaining full compliance with an evolving range of data protection regulations
  • Ensuring a diverse range of devices and operating systems all receive the latest security updates as soon as they become available
  • Ensuring corporate security policies are consistently enforced every time employees connect to the corporate network, without this requiring an impractical level of manual effort

All IT teams will already have systems and processes in place for asset management, ensuring corporate devices are kept secure throughout their lifespans and that users are equipped with whatever they need to best fulfil their roles. However, when employees are free to connect through whatever devices they like, control and visibility become increasingly difficult to maintain.

IT Service Management (ITSM) platforms must therefore evolve, providing IT teams with the tools they need to accommodate BYOD and other new ways of working without requiring the inherent cost and complexity of building a bespoke solution in-house.

We explore these challenges in our latest report, Rethinking IT Service Management: A New Model of Seamless IT for the Modern Workforce, in which our IT experts posit a new approach that allows for a truly holistic view of all workflows while still providing employees with the flexibility to which they have become accustomed. 

  169 Hits

Compliance cannot be an afterthought – it must be inherent in the design of all IT Service Management platforms

ITSM Compliance Header

The regulatory landscape is more complex than ever, with organisations across the public and private sectors having to meet an increasingly stringent range of obligations across all aspects of their services, including their IT ecosystems. Far from a box-ticking exercise, this is an essential part of strengthening business' overall security and resilience in the face of numerous aggressive, highly sophisticated cyberattacks. Indeed, as we closed out the first half of 2025, 67% of medium businesses and 74% of large businesses had experienced a breach or cyberattack of some description[1]

The evolution of the regulatory landscape is an appropriate response to these threats, helping minimise the risk of serious breaches affecting critical services that citizens depend on. To this end, G-Cloud bids require organisations to have IT Service Management (ITSM) tooling in place, in full compliance with the ITIL standard, without which they will be unable to bid on some of the most sought-after public sector contracts.

This presents a number of singular challenges for organisations, many of whom will not have the time, resources, or internal expertise to develop a bespoke ITSM platform in-house. However, most off-the-shelf platforms lack the flexibility required to accommodate the required tooling.

As a result, too many organisations will miss out on potentially lucrative business opportunities. But rather than treat these new compliance obligations as a burden, we should look at them as an opportunity to establish a new standard for ITSM deployments, ensuring they continue to form the foundation of seamless, secure IT that supports organisations' efficiency, innovation, and ongoing growth. This means a 'best of both worlds' scenario, where the cost efficiency and streamlined deployments of off-the-shelf solutions is combined with bespoke solutions' ability to accommodate the most rigorous compliance obligations.

This will require a whole new approach to

ITSM – one which we explore in depth in our latest report, Rethinking IT Service Management: A New Model of Seamless IT for the Modern Workforce. Inside, our own IT specialists explore the emerging challenges that successful ITSM deployments present to organisations, along with all the operational and business benefits that a world-class platform can open up. If you are in any doubt about whether your ITSM platform will remain fit for purpose in the years ahead, do not make any new investment until you have considered this information. Read the report now, and do not hesitate to get in touch if you would like to explore any aspect of your unique digital journey with our experts.

Don't Let Outdated Systems Leave You Exposed — The Future of Seamless IT Support

Modern ITSM is no longer optional - it's essential. The rise of remote work, tougher regulation, and growing cyber threats has exposed the limits of traditional, reactive systems. Weak workflows, lack of integration, and compliance gaps are risks that can't be ignored.

This whitepaper sets out a new framework: AI-powered automation, integrated security, and scalable architecture built for modern demands. It explains why compliance isn't a burden but a competitive necessity - especially in the public sector - and argues that expert delivery is just as important as the right tools.

Dive in if you want to future-proof your IT, protect your data, and avoid being caught out when the next crisis hits.

Rethinking IT Service Management
  288 Hits

The finance sector rises to meet its latest cyber security challenges

the-finance-sector-rises-to-meet-its-latest-cyber-security-challenges

The finance sector is required to have one of the most sophisticated cyber security postures in the world, with bureaus, banks, finance companies and insurers working closely with their technology partners to ensure sensitive financial data is managed, stored and transferred, with a stringent range of international security standards that must be adhered to at all times. However, cyber criminals have demonstrated repeatedly that they are constantly working to breach even the most sophisticated security ecosystems, devising new ways to exploit both technological vulnerabilities and human error.

  2728 Hits

Three steps to more secure employee passwords on World Password Day

three-steps-to-more-secure-employee-passwords-on-world-password-day

Passwords are often more associated with individual and consumer cyber security, but they are an essential part of an organisation's overall security posture. For example, you wouldn't leave the windows open overnight as this would allow easy access into the building for thieves. In the same way, a weak password offers cyber attackers easy access to your corporate infrastructure, after which they can use these credentials to escalate permissions until they granted themselves administration privileges, at which point the risk of financial and reputational damage becomes truly serious!

  2640 Hits

The Retail sector is fundamentally changing, and technology has a critical role to play

the-retail-sector-is-fundamentally-changing-and-technology-has-a-critical-role-to-play
The past decade has been a challenging one for the Retail sector, to say the least. Much has already been written about the impact of online shopping and streaming services on the high street, and the rise of COVID-19 and recent supply chain disruptions have only compounded the challenges facing even the most established brick-and-mortar retailers.
  1925 Hits

Retail 4.0: How technology is driving the move from products to experiences

retail-4-0-how-technology-is-driving-the-move-from-products-to-experiences
For a number of years now, the evolution of the Retail sector has typically been positioned as brick-and-mortar shops - including many longstanding fixtures of UK highstreets - fighting a losing battle against online retailers, such as the seemingly monolithic Amazon. However, the reality of the situation is not quite so clear cut…
  2107 Hits

Developing a new breed of security to suit the new ways in which we consume content

developing-a-new-breed-of-security-to-suit-the-new-ways-in-which-we-consume-content
The way in which we consume content has changed forever. Physical media and prescheduled TV and radio have rapidly given way to the convenience, accessibility, and range offered by streaming services. Independent content creators share the digital stage with the most well-established industry leaders, and numerous organisations have embraced the mantra that 'content is king', utilising online video as a key tool for building engagement with their prospects and customers.
  3055 Hits

Embracing the pop-up: how to ensure you are ready to meet your ideal customers anywhere

embracing-the-pop-up-how-to-ensure-you-are-ready-to-meet-your-ideal-customers-anywhere

The Retail sector is more diverse, dynamic, and rapidly changing than any other time in its history. This not only encompasses the way customers make their purchases – with online shopping, click-and-collect, and in-person shopping all converging to offer true, end-to-end experiences – but also the way retailers open and operate new sites. Whether this means trendy pop-up shops, kiosks at other brands' locations, or booths at events, retailers from up-and-coming start-ups to global leaders are no longer relying on fixed high-street locations to welcome their customers and put their wares on display, instead making sure they are present wherever their ideal customers are, and fully prepared to offer a world-class experience that builds brand recognition and loyalty.

  2372 Hits

Cultivating a new breed of cyber security for the new shopping experience

cultivating-a-new-breed-of-cyber-security-for-the-new-shopping-experience

Retailers - be they small local shops, online sellers, or top global brands - generate, transfer, and store more data than ever before, ranging from customer data (both online and in-store, as we have considered in previous articles), to supply chain and asset tracking data. Whether it's shopping online or utilising in-store apps to access the latest savings and special offers, the way customers shop has fundamentally changed forever, with the data they generate online and in person allowing retailers to build up unique personas that drive truly bespoke experiences.

  2837 Hits

Data-driven manufacturing - laying the foundation for tomorrow’s interconnected workflows

data-driven-manufacturing-laying-the-foundation-for-tomorrows-interconnected-workflows

Manufacturing workflows are evolving at an unprecedented rate, and the trend shows no signs of slowing down. The increasing effectiveness and affordability of 'smart' technologies and the Internet of Things means IT and OT are increasingly interconnected, with increasing volumes of data flowing between sites and devices on an ongoing basis.

  2147 Hits

Maintaining operational resilience in a changing Finance sector

maintaining-operational-resilience-in-a-changing-finance-sector

The Finance sector has always been one of the most dynamic, rapidly evolving industries, and this shows no signs of changing any time soon. But while shifts in the landscape may well open new opportunities, they will also come with new challenges, and it is the organisations who are ready and able to face these head-on who will continue to thrive in the years ahead.

  2264 Hits

Why Legal firms are the natural home of hybrid Cloud infrastructure

why-legal-firms-are-the-natural-home-of-hybrid-cloud-infrastructure

Although digital transformation amongst Legal firms has typically been comparatively slow compared to other sectors, the journey has picked up speed over the course of the last decade.

  2225 Hits

The pub of the future: the data-driven transformation of a great British institution

the-pub-of-the-future-the-data-driven-transformation-of-a-great-british-institution

Like many fixtures of our lives, Britain's pubs were heavily impacted by COVID-19, with their familiar patrons unable to come in for a post-work drink, or meet with friends at the weekend. But while it was undoubtedly a difficult period for the industry as a whole, this great British institution did as it has always done, and adapted to suit its patrons' evolving requirements.

  2802 Hits

Why SASE is so important in the new, data-driven retail landscape

why-sase-is-so-important-in-the-new-data-driven-retail-landscape

With fundamental shifts in consumer behaviour, changing economic conditions, and a rapidly evolving regulatory environment, it's a challenging but exciting time for the UK's retail sector, and technology has a key role to play. In particular, advances in IT and networking solutions are empowering retailers to enhance their operational efficiency, improve the customer experience, and retain their competitive edge in an increasingly online and interconnected world.

  2855 Hits

What does the ICO’s new fining guidance mean for your organisation?

what-does-the-icos-new-fining-guidance-mean-for-your-organisation

On the 18th March 2024, the Information Commissioner's Office issued its updated guidance around the issuing of fines when organisations have been found liable for the integrity of their customers' or end users' data being compromised. It is already well-established now that failure to ensure critical data remains secure will result in costly fines, as we have seen repeatedly in multiple high-profile cases over the years.

  1782 Hits

The Key to Establishing Ironclad Remediation and Disaster Recovery Processes

the-key-to-establishing-ironclad-remediation-and-disaster-recovery-processes

To Test or Not to Test?When it comes to IT disaster recovery and remediation processes, regular testing is not a 'nice to have' - it's absolutely essential!

This isn't hyperbole on my part. You just have to look at the news on any given day. We've all heard the horror stories of organisations in both the public and private sectors experiencing prolonged downtime during disasters due to inadequate preparation, lack of testing, and the unsuitability of their legacy remediation processes and systems.

  1602 Hits

Ransomware: lessons all companies can learn from the British Library attack

ransomware-lessons-all-companies-can-learn-from-the-british-library-attack

In October 2023, the British Library suffered "one of the worst cyber incidents in British history," as described by Ciaran Martin, ex-CEO of the National Cyber Security Centre (NCSC). 

The notorious Rhysida ransomware gang broke into one of the world's greatest research libraries, encrypting or destroying much of its data, and exfiltrating 600 GB of files, including personal information of British Library staff and users.

  78089 Hits

3.5 million Omni Hotel guest details held to ransom by Daixin Team

3-5-million-omni-hotel-guest-details-held-to-ransom-by-daixin-team

The international hotel chain Omni Hotels & Resorts has confirmed that a cyberattack last month saw it shut down its systems, with hackers stealing personal information about its customers.

In the aftermath of the attack, hotel guests reported that they had been forced to check in on paper, that room keys didn't work, and all phone systems and Wi-Fi were offline.

  87441 Hits

Offering clients the ultimate peace of mind – a new approach to security and remediation for legal firms

offering-clients-the-ultimate-peace-of-mind-a-new-approach-to-security-and-remediation-for-legal-firms

Although the sector as a whole has traditionally been comparatively wary of the ever-increasing pace of technology, legal services are increasingly data driven, with an abundance of AI-related discussion emerging within legal technology circles. The core Document Management Systems (DMS) and Practice Management Systems (PMS) remain the centre of focus for how and where to deploy a variety of rapidly maturing SaaS platforms, or dedicated, highly customised suites.

  1538 Hits
London Head Office

100 Leman Street, London, E1 8EU

Manchester Office

1 Spinningfields, Quay Street, Manchester, M3 3JE

Sales: 0845 470 4001
Support Portal Login
Service & Support: 0800 130 3365

 

*Calls to 0845 numbers will cost 7p p/m plus your phone company’s access charge. All inbound and outbound calls may be recorded for training or quality purposes.

*Calls to 0845 numbers will cost 7p p/m plus your phone company’s access charge.
All inbound and outbound calls may be recorded for training or quality purposes.

Click here to find out more about all of Exponential-e's accreditations.
© 2025 Exponential-e Ltd. Reg. No. 04499567, Reg. Address:100 Leman Street, London E1 8EU