Sony Pictures recent hacking proves that everyone might be vulnerable

2018-05-01T09:39:56+01:00December 4th, 2014|Security and Threats, Technology News|

Sony is working with the FBI and Silicon Valley security firm FireEye to investigate the attacks that apparently gave access to unreleased movies as well as personnel records, technical documents and other material. It has not commented on any Korean connection, except to deny a report Wednesday that it was poised to announce such a [...]

Comments Off on Sony Pictures recent hacking proves that everyone might be vulnerable

Overhaul of EU data protection laws draws closer

2017-08-08T13:17:58+01:00October 28th, 2014|Security and Threats, Technology News|

The General Data Protection Regulation (GDPR) is the EU’s scheme to unify existing data protection laws within the European Union.  It is designed to strengthen the protection of online personal data and will require all businesses handling EU residents' data to delete personal information on request or when it is no longer required by the [...]

Comments Off on Overhaul of EU data protection laws draws closer

Beware of fake Microsoft support phone calls!

2017-08-07T16:03:02+01:00October 20th, 2014|Company News, Security and Threats, Technology News|

We occasionally get reports from our clients of them receiving phone calls from ‘Microsoft’ (or sometimes other well-known software companies) offering technical support for problems they are often not aware of. Often the caller will request confidential information such as your PC serial number, passwords or sometimes attempt to create a remote control session to [...]

Comments Off on Beware of fake Microsoft support phone calls!

CryptoLocker – Dangerous ransomware on the increase

2017-08-07T16:12:23+01:00October 15th, 2014|Security and Threats, Tips and Advice|

Pro Drive has seen a noticeable increase in ‘CryptoLocker’ type malware recently – according to Symantec it has become eight times more prevalent than in January 2014. CryptoLocker is malicious software that encrypts your data files (word, PowerPoint, pictures, music, videos, etc.), preventing you from opening them, and then demands a ransom to give you [...]

Comments Off on CryptoLocker – Dangerous ransomware on the increase

New Government Cyber Security Standards for Business Introduced

2017-12-07T13:01:53+00:00October 6th, 2014|Security and Threats, Technology News, Tips and Advice|

A new government scheme has been developed to assess the controls businesses have in place to deal with cyber security threats. What is Cyber Essentials? The Cyber Essentials and Cyber Essentials Plus marks are a government and industry backed certification available for businesses of all size and sectors.  Companies who are assessed and meet the [...]

Comments Off on New Government Cyber Security Standards for Business Introduced

Is there room for USB memory sticks in today’s office?

2017-12-07T13:02:17+00:00August 7th, 2014|Security and Threats|

After my partner managed to lose a memory stick containing some important work related files this week, it made me wonder whether there is still a place in today’s office for these devices which we have used so resolutely for many years. There are many arguments to say that cloud based file storage services are [...]

Comments Off on Is there room for USB memory sticks in today’s office?

Phishing for your Apple ID – How to spot an attack

2017-09-15T12:50:31+01:00July 18th, 2014|Company News, Security and Threats, Tips and Advice|

We have currently seen a new phishing focus, Apple device users. Just recently one of our clients received the following email privately From: Apple [mailto:secure@mysecureicloud.co.uk] Sent:  July 2014 To: Matt Subject: Apple ID Temporarily Locked iCloud/Apple - matt This message is to inform you that your Apple Account (Your@emailaddress.co.uk) has been temporarily locked until you [...]

Comments Off on Phishing for your Apple ID – How to spot an attack

Why you should consider hosting your IT services in the cloud

2017-08-08T14:39:21+01:00July 2nd, 2014|Business Continuity, Company News, Security and Threats, Tips and Advice|

We are often asked by our clients and prospective clients if and why they should consider hosting IT services in the cloud as opposed to running them onsite in a traditional manner. There are many good reasons to host of course but the discussion should also focus around whether it is right to host services [...]

Comments Off on Why you should consider hosting your IT services in the cloud

Slow internet in your office? What you can do about it…

2017-08-07T12:35:54+01:00June 28th, 2014|Company News, Productivity, Security and Threats, Tips and Advice|

There are few things that are more frustrating at work than trying to operate with a slow internet connection. We now work at such a high pace, with tighter deadlines than ever and with many people located in different places that having useable internet has gone from being a luxury to a necessity. Yet for [...]

Comments Off on Slow internet in your office? What you can do about it…

Dyreza Banker Trojan – The Digital Burglar

2017-08-08T09:47:55+01:00June 17th, 2014|Security and Threats|

Banker Trojans have proven to be a reliable and effective tool for attackers. Allowing them to  quietly steal large amounts of money from unwitting victims. Zeus, Carberp and many other Torjans have made piles of money for their creators and the attackers who use them, and researchers have been looking at a newer banker Trojan [...]

Comments Off on Dyreza Banker Trojan – The Digital Burglar
Go to Top