October 2025 Newsletter

NCS News

Welcome to our October newsletter update.

What can we learn from the AWS outage?

Last week, Amazon Web Services (AWS) experienced one of its most disruptive outages in recent memory.

Spanning over 15 hours, the incident affected more than 100 AWS services and sent shockwaves across industries worldwide. Downdetector logged 6.5 million disruption reports across more than 1,000 services.

From services like Snapchat and Roblox all the way to commerce giants, HMRC and airlines such as Delta, the outage exposed a critical vulnerability in modern IT infrastructure: over-reliance on a single cloud provider.

🖱️ What can we learn from the outage?

 

Is Cloud Still King? Why some businesses are bringing IT back in-house  

This month, we’ve been asking a key question: is storing data in the cloud still the best option — or is it time to bring IT back in-house?

Over the past few years, cloud computing has become the go-to solution for many organisations. It’s flexible, cost-effective, and allows businesses to scale quickly without investing in expensive hardware.

But now, some companies are starting to rethink that approach.

As cloud usage grows, so do concerns around data privacy, security, unexpected costs, and regulatory compliance. These challenges are prompting businesses to take a fresh look at their IT strategies — and in some cases, bring systems back on-site.

🖱️ Here are some of the reasons why >

 

Why it’s time to replace your SSL-VPN with Zero Trust

We have also been looking at Secure Remote Access. It is evolving — is your business ready?

SSL-VPN (Secure Sockets Layer – Virtual Private Network) is no longer enough. Traditional SSL-VPNs were built for a different era — one where remote access was the exception, not the norm.

Today, with hybrid workforces and cloud-first strategies, VPNs expose your network to unnecessary risk. Broad access, outdated perimeter-based security, and poor scalability make them a liability in most modern IT environments.

Last year, 58% of ransomware incidents originated from compromised perimeter security appliances like VPNs and firewalls – the single largest attack method for ransomware.

This represents a significant shift in ransomware tactics, with attackers moving towards systematically targeting poorly secured VPN infrastructure.

🖱️ Enter Zero Trust Network Access (ZTNA) >

 

Stop Battling for Bandwidth – Take Control of your Internet Connection

If broadband is slowing your business down, it’s time to stop sharing your internet connection with everyone else.

When you’re using standard broadband connectivity, if the business next door is going through a busy spell, you might end up experiencing delays to your own internet connection, slowing business down and frustrating your colleagues.

If this is happening, it’s time to consider a leased line (sometimes called an Ethernet leased line). It might be just what your business needs.

🖱️ More about leased lines >

Posted in News