The Future of Broadband Blog | BBH Insights

Our "Future of Broadband Blog " blog is the product of extensive research, designed to keep you ahead in the fast-evolving world of broadband and business broadband.

Business WLANs How does a Wireless LAN (WLANs) work for businesses

A Wireless LAN (WLAN) or WiFi network is the wireless portion of a business local area network. It lets WiFi devices connect to each other, local services, and the wider internet without needing a wired connection. This article explains how they work, the different types, security, and how to implement them appropriately. Contents What is…

read more
Next-Generation Firewalls How do Next-Generation Firewalls (NGFW) work?

Next-Generation Firewalls (NGFWs) are advanced firewalls capable of inspecting the contents of internet data in real time to detect and block threats like malware before they reach local networks or cloud environments. This article explains how NGFWs work, how they differ from traditional firewalls, their benefits, and how to choose the right one for your…

read more
Conditional access Conditional access for business security and compliance

Conditional access is the zero trust system that lets businesses grant, customise or block user access to apps or systems depending on their location, device or role. It constantly monitors requests to ensure security policies are met at all times, bolstering overall security. This guide covers conditional access in detail, from how it works, its…

read more
SSO A guide to Single Sign On (SSO) for businesses

Single Sign-On (SSO) lets users access multiple business apps and systems through a single set of credentials, eliminating the need to remember and enter multiple usernames and passwords at every login. It enables IT teams to centrally manage and monitor access across all systems, defining access rules, revoking permissions for departing employees, and tracking suspicious…

read more
Mail app icon with unread messages on smartphone screen, representing Business Email Compromise and phishing email risks What is Business Email Compromise (BEC) and how to avoid it

Business Email Compromise (BEC) is a scam where attackers impersonate trusted email senders to trick businesses into making fraudulent payments or sharing sensitive data. It’s highly dangerous because it bypasses advanced defences by exploiting human trust and urgency. This guide explains how BEC works, its impact, and how to prevent and respond effectively when one…

read more
MFA Multi-Factor-Authentication (MFA) for businesses: What it is and why it matters

Multi-Factor Authentication (MFA) adds additional verification steps before granting access to business systems. It is one of the simplest and most effective ways for organisations of any size to prevent unauthorised access, security breaches, and data theft. This guide explains how MFA works, outlines the different types available, and provides practical recommendations for implementing it…

read more