How can I protect against web based security threats?

2017-08-08T13:00:52+01:00March 27th, 2014|Security and Threats|

In our last article we discussed the types of web based security threats and how they might affect your business. Whilst the consequences of a web based attack can be severe there is fortunately a lot you can do to minimise the risk. Education Most web based security attacks come as a result of the [...]

Comments Off on How can I protect against web based security threats?

Why do I need to protect my business from web based security threats?

2017-08-08T14:35:06+01:00March 24th, 2014|Security and Threats|

The exponential increase in the number of security threats from traditional web browsing has been well publicised in recent years and is a risk to all of us both personally and to our businesses. The increased focus on web based threats has been driven mainly by much improved security around modern email services – would [...]

Comments Off on Why do I need to protect my business from web based security threats?

What is ‘your complete office in the cloud’ and why do you need one?

2017-12-06T19:30:11+00:00January 31st, 2014|Company News, Productivity, Security and Threats, Tips and Advice|

No doubt most of us have now seen Office 365 advertised on the TV, radio and of course the web and many of us are probably wondering what exactly it is? After all a ‘complete office in the cloud’ is probably not the most distinct definition for an IT system. To understand what Office 365 [...]

Comments Off on What is ‘your complete office in the cloud’ and why do you need one?

Making your personal passwords more secure

2017-07-19T15:58:53+01:00December 13th, 2013|Security and Threats|

These days we have accounts everywhere, and with every account you must remember you username (which is usually your email address) and of course your passwords. How many do you have to remember? No doubt you have your work computer, home computer, work email, personal email, phone, tablet, ebay, facebook, twitter, multiple shopping sites; the [...]

Comments Off on Making your personal passwords more secure

Is your business data leaking through personal devices?

2017-08-08T12:10:51+01:00November 15th, 2013|Security and Threats, Tips and Advice|

Although Bring Your own Device (BYoD) seems to have been discussed in enterprise organisations for what seems like years, Pro Drive are finding that the reality is that it is the small to medium (SME) clients that really need to balance the flexibility of enabling access to key information or applications like email with the [...]

Comments Off on Is your business data leaking through personal devices?

Disposing of your old IT equipment – are you compliant?

2017-08-07T16:16:04+01:00October 11th, 2013|Security and Threats, Tips and Advice|

It is great for the productivity of your business when you are able to invest in new equipment, and many organisations now appreciate that a regular upgrade programme will more than repay the investment. However have you considered what happens to your old equipment and what your responsibilities are? Do you have internal operating procedures [...]

Comments Off on Disposing of your old IT equipment – are you compliant?
Go to Top