Managing mobile devices in your business

2017-08-07T10:51:55+01:00May 6th, 2014|Company News, Productivity, Security and Threats, Tips and Advice|

Until not that long ago choosing a mobile device for your business was simple – it would be a Blackberry.  Their messaging ability and more importantly the ability to deploy, manage and secure them in a business was light years ahead of the competition. However things change rapidly in the technology world and for many [...]

Comments Off on Managing mobile devices in your business

Heartbleed Bug

2017-08-08T09:57:58+01:00April 14th, 2014|Security and Threats, Tips and Advice|

You will no doubt have read about the Heartbleed bug affecting some web based systems which was widely reported in the national press last week. There is a significant amount of confusing and often conflicting information about what action you may need to take. So here is the Pro Drive view on it: What is [...]

Comments Off on Heartbleed Bug

3 essential tips for safer web browsing

2017-08-07T15:50:52+01:00April 10th, 2014|Company News, Security and Threats, Tips and Advice|

#1 Beware of pop ups advertising free antivirus scans or software updates Rogue security software or “scare ware” is employed by criminal gangs attempting to lure people into fraudulent transactions. Initially on PCs, it has now appeared on certain smartphones running Android, a new but inevitable twist. Ensure you know what security software you have [...]

Comments Off on 3 essential tips for safer web browsing

How can I protect against web based security threats?

2017-08-08T13:00:52+01:00March 27th, 2014|Security and Threats|

In our last article we discussed the types of web based security threats and how they might affect your business. Whilst the consequences of a web based attack can be severe there is fortunately a lot you can do to minimise the risk. Education Most web based security attacks come as a result of the [...]

Comments Off on How can I protect against web based security threats?

Why do I need to protect my business from web based security threats?

2017-08-08T14:35:06+01:00March 24th, 2014|Security and Threats|

The exponential increase in the number of security threats from traditional web browsing has been well publicised in recent years and is a risk to all of us both personally and to our businesses. The increased focus on web based threats has been driven mainly by much improved security around modern email services – would [...]

Comments Off on Why do I need to protect my business from web based security threats?

What is ‘your complete office in the cloud’ and why do you need one?

2017-12-06T19:30:11+00:00January 31st, 2014|Company News, Productivity, Security and Threats, Tips and Advice|

No doubt most of us have now seen Office 365 advertised on the TV, radio and of course the web and many of us are probably wondering what exactly it is? After all a ‘complete office in the cloud’ is probably not the most distinct definition for an IT system. To understand what Office 365 [...]

Comments Off on What is ‘your complete office in the cloud’ and why do you need one?

Making your personal passwords more secure

2017-07-19T15:58:53+01:00December 13th, 2013|Security and Threats|

These days we have accounts everywhere, and with every account you must remember you username (which is usually your email address) and of course your passwords. How many do you have to remember? No doubt you have your work computer, home computer, work email, personal email, phone, tablet, ebay, facebook, twitter, multiple shopping sites; the [...]

Comments Off on Making your personal passwords more secure

Is your business data leaking through personal devices?

2017-08-08T12:10:51+01:00November 15th, 2013|Security and Threats, Tips and Advice|

Although Bring Your own Device (BYoD) seems to have been discussed in enterprise organisations for what seems like years, Pro Drive are finding that the reality is that it is the small to medium (SME) clients that really need to balance the flexibility of enabling access to key information or applications like email with the [...]

Comments Off on Is your business data leaking through personal devices?

Disposing of your old IT equipment – are you compliant?

2017-08-07T16:16:04+01:00October 11th, 2013|Security and Threats, Tips and Advice|

It is great for the productivity of your business when you are able to invest in new equipment, and many organisations now appreciate that a regular upgrade programme will more than repay the investment. However have you considered what happens to your old equipment and what your responsibilities are? Do you have internal operating procedures [...]

Comments Off on Disposing of your old IT equipment – are you compliant?
Go to Top