Don’t be A hacker’s dream come true – follow our essential tips!

2020-10-27T12:34:39+00:00January 15th, 2019|Cyber Security, Security and Threats, Tips and Advice|

Sharing our personal information is a fact of life nowadays. Very few of us would be willing to sacrifice the convenience of purchasing goods and signing up for services online. However, as most of us are aware, there are risks when entrusting organisations to safely process and store our data. We may tend to believe [...]

Comments Off on Don’t be A hacker’s dream come true – follow our essential tips!

How to stop your email account getting hacked in 6 easy steps

2019-01-15T13:22:50+00:00December 18th, 2018|Cyber Security, Security and Threats, Tips and Advice|

You’re a sitting target, under immediate threat Cyber crime is on the increase, and criminals are developing increasingly sophisticated ways to break through security walls. All they need to find is a weak spot, a door left open - so to speak, and they’re in. That weak spot? Your email account. Email accounts present a [...]

Comments Off on How to stop your email account getting hacked in 6 easy steps

5 Nasty Gifts Cyber Criminals Have Planned for 2019

2018-12-14T14:59:37+00:00December 14th, 2018|Cyber Security, Security and Threats, Technology News|

It’s the time of year when we’re looking for presents to give that will warm hearts and raise spirits. This all takes a bit of planning and looking ahead. The criminal world is planning too, but their intentions aren’t quite so honourable. Similar to a dark version of the Three Wise Men, the gifts cyber [...]

Comments Off on 5 Nasty Gifts Cyber Criminals Have Planned for 2019

Don’t Wait to Update: Run out-dated software at your peril

2019-01-23T09:12:58+00:00December 14th, 2018|Security and Threats, Tips and Advice|

Perhaps updating your software is the last thing on your to-do list at this time of year? There’s lots going on and the last thing you need is your current task interrupted while you wait for an update to download. What’s more, there are so many of those annoying notifications – telling you your software [...]

Comments Off on Don’t Wait to Update: Run out-dated software at your peril

Is your data for sale on The Dark Web?

2018-12-03T10:08:49+00:00November 29th, 2018|Security and Threats, Tips and Advice|

Most of us use the Internet many times a day, for both business and personal use. We have become very used to supplying whatever information is required, in order to access prod-ucts and services. This means more companies than ever hold information about individu-als, businesses and their clients. The data protection legislation, brought into force [...]

Comments Off on Is your data for sale on The Dark Web?

Why Accountants Need Cyber Essentials…

2022-11-25T10:39:03+00:00November 27th, 2018|Company News, Compliance, Cyber Essentials, Security and Threats|

For those that may not be aware, there is a government backed standard for cyber security, called Cyber Essentials. It is, in simple terms, a way for businesses to demonstrate a responsible approach to cyber security, protecting both themselves and their clients. Cyber security is something we all need to take seriously: currently around [...]

Comments Off on Why Accountants Need Cyber Essentials…

What lies beneath… Are you your own biggest security threat?

2018-11-08T10:45:11+00:00October 22nd, 2018|Business Continuity, Security and Threats, Tips and Advice|

What’s the biggest risk to your company…IT security, poor software? No, people. The future security of your business and the sensitive information it possesses, all depends on those who use it. The GDPR has raised the stakes and business’ priorities when it comes to the proper usage and storage of information. Between now and 2021, [...]

Comments Off on What lies beneath… Are you your own biggest security threat?

Road to recovery – top 5 immediate actions after a security breach

2018-09-26T09:24:00+01:00September 26th, 2018|Security and Threats, Tips and Advice|

If you notice a breach in your business data, the first thing to do is identify how serious it is. Identifying whether information such as personal email addresses, dates of birth and payment accounts are taken, can have financial implications for your company, staff and customers. In the event of a breach you can take [...]

Comments Off on Road to recovery – top 5 immediate actions after a security breach

Keeping your mobile workforce secure

2018-08-29T17:28:52+01:00August 29th, 2018|Security and Threats, Tips and Advice|

Mobile workforce employees using company IT systems on the move may inadvertently be posing a risk to your company data that needs special attention. Something as simple as using web based or ‘Software as a Service’ apps, along with free hot spot services could accidentally be providing cyber criminals easy access to your confidential business [...]

Comments Off on Keeping your mobile workforce secure

Cyber security for small businesses

2018-09-26T10:36:05+01:00August 6th, 2018|Security and Threats|

Every small business uses the internet to do business. The ways to communicate with customers and suppliers, investigate markets, conduct financial transactions, and advertise and sell are commonplace. Most employees in a business use their IT systems intuitively. A few experts in IT around the office usually advise how to be cyber-aware and cyber-safe, but [...]

Comments Off on Cyber security for small businesses
Go to Top