Our News

How can we help?

Don't hesitate to get in contact...

Leave blank for all. Otherwise, the first selected term will be the default instead of "Any".
  • Cyber Security Report 2016

    It's not if, but when...

    With 2.5 million cyber crimes reported in 2015, a 38% increase in the number of incidents reported in 2014, the threat of a cyber attack has no longer become a case of if it will happen, but when it will happen! 

    Read More
  • Golf Day 2016

    Blue Logic tees off....

    As is our yearly tradition, we are pleased to announce that this year's Golf Day will be held on Wednesday 13th July 2016. 

    Jointly chaired by Blue Logic Managing Director Mark Ambler, and Sales and Marketing Director Dave Helm, this year's event is due to be held at the prestigious Scarcroft Golf Club in Leeds. If you'd like to find out more about the fantastic facilities at Scarcroft, click here

    Read More
  • Pure Fibre has finally reached Leeds!

    With over 200km of pure fibre digital infrastructure now available for both businesses and the public sector to utilise, Leeds is one of the most digitally-connected cities in the world. A pure fibre connection all the way to your business premises will provide you with the most advanced connectivity available in the UK - without the price tag you might expect! 

    Read More
  • Key Trends for the Construction Industry

    A technical revolution is taking place within the construction sector, with businesses realising the limitless possibilities that investing in the right IT networks and systems can bring. 

    Our experience providing IT and infrastructure solutions within the construction industry; to customers including J. Rotherham, Speedclad and Abstract Securities Limited; has allowed us to identify some key technical considerations that could be of interest to you.

    Read More
  • Social Engineering Part Two

    Are you getting ahead of the hackers?

    With Social Engineering on the rise in the UK, we’ve put together a two part series discussing the problem at large. Building from part one, in this article we’ll discuss further types of attack to be aware of, why they are on the rise, and the steps you can take to protect both yourself and your business:

    What types of attack are most common?

    Quid Pro Quo

    Read More
  • Social Engineering Part One

    Are you placing your cyber trust in the wrong hands?

    With cyber security threats at an all-time high, there’s never been a better time to arm yourself and your business against potential hackers. Threats can come in many forms, but one over-arching term to become familiar with is ‘Social Engineering.’

    In part one of our two part series, we’ll explain what social engineering is, and three common types of attack to be aware of:

    Read More
  • Blue Logic Appoints John Woodhead

    Blue Logic, Yorkshire's leading IT solutions provider, are pleased to announce the appointment of John Woodhead as Head of Finance. Following their achievement of surpassing a £6 million turnover, and with commercial success continually building year on year, the rapidly growing IT Company will use John’s invaluable business insight to progress even further in the market, whilst simultaneously streamlining and refining financial processes.

    Read More
  • Gigabit Fibre Is Coming!

    Watch this space for more details on Leeds joining the Gigabit City revolution...

    Blue Logic has formed a partnership with Diva Telecom to provide the new generation of affordable, gigabit speed internet services. With pure fibre you will be able to unlock huge business benefits including increased productivity, efficiency and agility.

    Read More
  • Warning! Jigsaw Ransomware Threat

    Don’t get tricked into playing the game…

    Jigsaw, a new strain of cryto-ransomware, is increasingly on the rise within the UK. Named after the killer in the Saw horror films, this malware represents one of the latest entries into the ransomware family, and has only been detected by researchers as of March 2016.

    Jigsaw essentially works by encrypting user's system files, and threatening to delete them if users do not follow specific instructions and pay the 'ransom' requested.

    Read More
  • Bring Your Own Device - Part Two

    Plan for the future...

    In an increasingly mobile world, security and privacy risks are often at the forefront of many business’s concerns when considering implementing a 'Bring Your Own Device' (BYOD) policy. Taking the time to plan for and manage the entire process around implementing a mobile device policy will ensure that your company is prepared for and protected against most major security risks.   

    Read More
  • Bring Your Own Device - Part One

    Prepare for success...

    With 12.1 billion mobile devices estimated to be in use worldwide by the end of 2018, implementing a ‘Bring Your Own Device’ (BYOD) policy is a hot topic. However, many organisations remain cautious of fully rolling out BYOD and remote working policies, with 72% reporting that their main security concerns centre on data leakage and loss.  

    Read More
  • Join our Cyber Security Event on 25th May

    Sign up for our FREE event on Wednesday 25th May 2016

    Are you...

    Read More
  • Avoid Cyber Security Weak Spots

    Cyber crime - don't get caught out!

    With cyber-crime increasingly on the rise, there has been a significant increase in the number of companies investing in core safeguards against cyber-attacks. However, there still remains a substantial failure to address the classic mistakes and weak spots that leave businesses vulnerable to exploitation by cyber criminals. 

    Read More
  • Create a Secure Business Culture - Part 2

    Knowledge is the key to prevention...

    In the second of our two part series on creating a safe and secure business environment, we bring you further tips to aid you in avoiding the wave of cyber-crime currently sweeping the UK. 

    In response to recent highly publicised scams, data breaches and phishing attacks, many organisations are increasingly implementing core safeguards, but the challenge of cyber security is still one that many UK businesses are failing to properly address.

    Read More
  • Create a Secure Business Culture - Part 1

    Lead from the front to protect your business...

    In the UK, the rise in regularity and severity of cyber breaches continues to escalate. With a 38% growth in the number of cyber-attacks in the past year, and the cost of an average incident increasing to £1.7 million, the risks to companies’ reputations and profits are rising.

    In the first of our two part series on creating a secure business culture, we highlight some vital areas to focus on to avoid your business becoming a statistic.

    Read More
  • Don't Make Classic Cyber Security Mistakes

    Cyber-crime: It's not if, it's when!

     With 2.5 million cyber-crimes reported by the Office of National Statistics in 2015; a 38% increase in the number of incidents reported in 2014; and regular media coverage on high-profile data breaches, it is clear that cyber-crime is real and here to stay.

    One of the easiest and most effective ways to protect your business is to understand the common pitfalls that people tend to fall prey to: 

    Common Mistakes

    Read More
  • We're delighted to announce our latest Accreditations

    To ensure we're offering the best possible IT solutions to our customers, we pride ourselves on investing fully in our Consultant's skills and knowledge by providing further learning and training opportunities.

    A massive WELL DONE to the most recent team members who have put hard work and dedication into achieving their latest accreditations!

    Read More
  • IT Trends For the Legal Sector

    A technical revolution is taking place within the Legal sector, with firms realising the limitless possibilities that investing in the right IT infrastructure can bring. Spanning from Leeds to Liverpool, at Blue Logic we pride ourselves on providing a first-class IT service to many Legal organisations based within the North of England.

    Read More
  • SQL Server 2005 - End Of Life (EOL)

    SQL Server 2005 approaches end of support on 12th April 2016, and signals the end of availability for support, security updates, patches and fixes from Microsoft directly.

    Read More
  • Protect Your Business From Malicious Phishing

    With the recent spate of highly–publicised SMS and email phishing scams, it’s more important than ever to keep both yourself and your business safe from potential threats.

    Read More