• All
  • All Insights
  • Articles
  • Pescado News
  • Uncategorized
  • Webinars

On Saturday 7th September, 21 of Pescado’s dedicated team and 6 friends donned their walking gear and set off at 8am from Frodsham on what turned out to be a 19-mile walk to Beeston Castle along the Sandstone Trail. The trail was more of a trial...

With just over 2 weeks to go we are 56% of target.  Pete’s condition has worsened since our original post, his nightly peritoneal dialysis wasn’t working and after 2 sets of surgery he has now had to move to hemodialysis. However, he has had some amazing...

Every product has a lifecycle. It begins when the product is released and ends when the product is no longer supported. In 2020, support will end for Windows 7 and Office 2010. These products will continue to work, but after January 14th all new security and...

Our much loved colleague Peter aka Cliffy is currently undergoing nightly dialysis whilst he is on the waiting list for a new kidney.  Despite this he is still in the office most days and remains his normal positive cheeky self.  Cliffy has worked at Pescado...

5G is fast approaching with EE launching on the 30th May and Vodafone on the 3rd July, your options for getting connected are going to hot up this summer. What is 5G? We started with 2G giving users the ability to text, mms and basic internet access,...

Cyber Security is pretty much what it sounds like. It’s the practice of defending electronic devices such as computers, mobile phones, servers and data from a different variety of malicious attacks. It is the protection of computer systems from theft or damage to their hardware,...

Cyber Essentials is a Government backed scheme which is simple but very effective. It helps to protect your organisation against a range of the most common cyber attacks. It is easy to think of cyber attacks still being the stuff of Science fiction, however in reality...

There are a number of reasons as to why individuals may attack you or your company. Cyber criminals are interested in making money through fraud or from sales of valuable information, which they get from cyber attacks. Most hackers will find joy in hacking into...