Don’t be A hacker’s dream come true – follow our essential tips!

2019-01-15T14:03:34+00:00 January 15th, 2019|Cyber Security, Security and Threats, Tips and Advice|

Sharing our personal information is a fact of life nowadays. Very few of us would be willing to sacrifice the convenience of purchasing goods and signing up for services online. However, as most of us are aware, there are risks when entrusting organisations to safely process and store our data. We may tend to believe [...]

Comments Off on Don’t be A hacker’s dream come true – follow our essential tips!

How to stop your email account getting hacked in 6 easy steps

2019-01-15T13:22:50+00:00 December 18th, 2018|Cyber Security, Security and Threats, Tips and Advice|

You’re a sitting target, under immediate threat Cyber crime is on the increase, and criminals are developing increasingly sophisticated ways to break through security walls. All they need to find is a weak spot, a door left open - so to speak, and they’re in. That weak spot? Your email account. Email accounts present a [...]

Comments Off on How to stop your email account getting hacked in 6 easy steps

Don’t Wait to Update: Run out-dated software at your peril

2019-01-10T09:26:37+00:00 December 14th, 2018|Security and Threats, Tips and Advice|

Perhaps updating your software is the last thing on your to-do list at this time of year? There’s lots going on and the last thing you need is your current task interrupted while you wait for an update to download. What’s more, there are so many of those annoying notifications – telling you your software [...]

Comments Off on Don’t Wait to Update: Run out-dated software at your peril

Is your data for sale on The Dark Web?

2018-12-03T10:08:49+00:00 November 29th, 2018|Security and Threats, Tips and Advice|

Most of us use the Internet many times a day, for both business and personal use. We have become very used to supplying whatever information is required, in order to access prod-ucts and services. This means more companies than ever hold information about individu-als, businesses and their clients. The data protection legislation, brought into force [...]

Comments Off on Is your data for sale on The Dark Web?

What lies beneath… Are you your own biggest security threat?

2018-11-08T10:45:11+00:00 October 22nd, 2018|Business Continuity, Security and Threats, Tips and Advice|

What’s the biggest risk to your company…IT security, poor software? No, people. The future security of your business and the sensitive information it possesses, all depends on those who use it. The GDPR has raised the stakes and business’ priorities when it comes to the proper usage and storage of information. Between now and 2021, [...]

Comments Off on What lies beneath… Are you your own biggest security threat?

5 key IT policies and procedures you really should have in place

2018-10-05T13:08:28+00:00 October 5th, 2018|Tips and Advice, Uncategorized|

So you have company policies coming out of your ears, and now you have been told that you need a whole new bunch of IT paperwork on top of it all? Worse still - your clients are asking to see the new paperwork. Where do you start and what do you really need? Here, we [...]

Comments Off on 5 key IT policies and procedures you really should have in place

Gone Phishing? How to deal with a phishing email

2018-09-26T09:28:55+00:00 September 26th, 2018|Technology News, Tips and Advice|

What is phishing? Technically speaking it is ‘the fraudulent attempt to obtain sensitive information for malicious reasons, by disguising as a trustworthy contact, normally in an electronic communication such as email.’ Realistically it’s every business owners nightmare. Staff clicking on a seemingly legitimate email and unlocking mountains of sensitive data, potentially causing a lot of [...]

Comments Off on Gone Phishing? How to deal with a phishing email

Road to recovery – top 5 immediate actions after a security breach

2018-09-26T09:24:00+00:00 September 26th, 2018|Security and Threats, Tips and Advice|

If you notice a breach in your business data, the first thing to do is identify how serious it is. Identifying whether information such as personal email addresses, dates of birth and payment accounts are taken, can have financial implications for your company, staff and customers. In the event of a breach you can take [...]

Comments Off on Road to recovery – top 5 immediate actions after a security breach

Keeping your mobile workforce secure

2018-08-29T17:28:52+00:00 August 29th, 2018|Security and Threats, Tips and Advice|

Mobile workforce employees using company IT systems on the move may inadvertently be posing a risk to your company data that needs special attention. Something as simple as using web based or ‘Software as a Service’ apps, along with free hot spot services could accidentally be providing cyber criminals easy access to your confidential business [...]

Comments Off on Keeping your mobile workforce secure

Building trust with your IT consultant

2019-01-17T09:08:45+00:00 July 12th, 2018|Tips and Advice|

For a relationship to grow, trust is hugely important part. Finding an IT consultant you can trust and one who can advise you accurately, can be a difficult task. Trust is a mysterious creature, no one can tell you exactly what they look for, where it originates or how it develops. Building trust as an [...]

Comments Off on Building trust with your IT consultant