How do I choose a secure smartphone for my business?

2023-09-08T11:58:49+01:00September 8th, 2023|Compliance, Cyber Essentials, Cyber Security|

Choosing a mobile phones can be quite a personal decision – even when it comes to it being for business use.  In fact many smartphones being used for business purposes are in fact owned by staff and not the company. Most staff do not wish to carry a personal and business phone and businesses [...]

Comments Off on How do I choose a secure smartphone for my business?

How Multi-Factor Authentication (MFA) Number-Matching improves online security

2023-06-13T11:15:02+01:00June 13th, 2023|Cyber Security|

We're focusing here on how using Multi-Factor Authentication (MFA) Number-Matching can help businesses protect themselves against cyber attacks. Recently, Microsoft has set this feature as the default option for all Authenticator Push notifications to further fortify your digital environment. Why use Multi-Factor Authentication (MFA) Number-Matching? Online security breaches are not only more prevalent but can [...]

Comments Off on How Multi-Factor Authentication (MFA) Number-Matching improves online security

Mobile phones are cyber secure right? Wrong! 

2023-05-26T12:59:41+01:00May 25th, 2023|Cyber Security, Security and Threats, Tips and Advice|

If you didn’t attend our recent mobile phone security webinar, you may wonder what all the fuss is about – surely mobile phones are protected against cyber threats you ask. Unfortunately you have to remember that your mobile phone or tablet is just another computer and, as such, is still as vulnerable to cyber threats [...]

Comments Off on Mobile phones are cyber secure right? Wrong! 

Passkeys – for passwordless sign-ins

2022-11-03T09:36:01+00:00November 3rd, 2022|Cyber Security, Technology News|

Microsoft, Google and Apple’s latest iPhone, Mac and iPad devices include Passkeys, a replacement for passwords. Learn more here … If you have had enough of having to remember and use passwords you will be pleased to hear there’s an alternative out there. What is Passkeys? Passkeys comprise two digital keys instead of username [...]

Comments Off on Passkeys – for passwordless sign-ins

Power up your accounting software & people

2022-09-01T12:40:34+01:00September 1st, 2022|Accountants|

The digitalisation of the accountancy sector means clients and prospects (and new recruits) expect firms to be using the best accounting software and technology, not creaking legacy systems or, worse, pushing paper around. You may think your firm has ‘adequate’ accounting software and tech – and you may be so busy you don’t consider this [...]

Comments Off on Power up your accounting software & people

Major Apple security alert for iPhone, iPad and Macs

2022-08-23T17:57:44+01:00August 22nd, 2022|Cyber Security, Tips and Advice|

A major Apple security alert has been announced, regarding a serious cyber security vulnerability that can affect their iPhone, iPad and Mac devices.  Here's what you should know and do ... If exploited the flaw could allow cyber criminals to take complete control of a victim’s device.  This could potentially grant them access to personal [...]

Comments Off on Major Apple security alert for iPhone, iPad and Macs

Writing a Cyber Security Incident Response Plan

2022-05-20T15:42:10+01:00May 3rd, 2022|Cyber Security|

AKA: What to do if you suffer a cyber attack, a Cyber Security Incident Response Plan provides steps to follow if you or your business gets hit by cyber crime and every organisation should have one! Discovering and experiencing a cyber attack is a high-pressure situation where speed of response is critical. The faster you [...]

Comments Off on Writing a Cyber Security Incident Response Plan

Why you should act on cybersecurity threats

2022-03-29T17:50:56+01:00March 17th, 2022|Cyber Security, Energy, Financial Services, GDPR, Law, Security and Threats, Tips and Advice|

Due to the conflict in Ukraine the government, the ICO and UK cyber experts generally are all urging SMEs to act against increased cybersecurity threats. The situation in Ukraine poses an increased risk of cyber attacks to businesses and exacerbates the rise in cybercrime seen throughout the COVID-19 pandemic, partly due to cyber criminals exploiting [...]

Comments Off on Why you should act on cybersecurity threats

Vulnerability Assessment – what it is and who needs it

2022-03-08T16:01:19+00:00March 8th, 2022|Cyber Security, Security and Threats, Tips and Advice|

Your business might need a Vulnerability Assessment, starting with a scan, for several reasons. Here, we explain what it is and why it needs to be managed. Watch our video to learn all about Vulnerability Assessment and/or read on below!      Why would my business need a Vulnerability Assessment? You are certified to [...]

Comments Off on Vulnerability Assessment – what it is and who needs it

Why energy firms need Cyber Essentials

2022-05-20T15:46:17+01:00January 11th, 2022|Cyber Essentials, Cyber Security, Energy|

Energy cybersecurity is something that the sector is rightly worried about - attacks aren't just happening in the movies. We explain why energy firms need Cyber Essentials ... Many energy businesses, especially those involved in storage, distribution and production are a part of critical national infrastructure. If you are one of these businesses, you should [...]

Comments Off on Why energy firms need Cyber Essentials
Go to Top