Cleaning Up – Keeping Your Data Safe from Prying Eyes

2019-02-18T15:42:17+00:00 February 14th, 2019|Cyber Security, Security and Threats, Tips and Advice|

We’ve had our eyes fixed to ITV’s six-part drama, Cleaning Up, over the past few weeks and it’s got us thinking: how well can you really trust everyone that comes in and out of your office(s)? The biggest risk to your company is, without a doubt, people. From your regular employees and temporary freelancers to [...]

Comments Off on Cleaning Up – Keeping Your Data Safe from Prying Eyes

SMCR – Are you ready?

2019-02-21T15:59:15+00:00 February 14th, 2019|Cyber Security, Security and Threats, Tips and Advice, Uncategorized|

If there were a major cyber security breach at your company, what would happen? Chances are it would be very difficult to pinpoint the exact person or people responsible, meaning those involved could potentially get off scot-free. Now, what if the responsibility of any wrongdoing wasn’t placed on your firm but lay solely on senior [...]

Comments Off on SMCR – Are you ready?

Don’t be A hacker’s dream come true – follow our essential tips!

2019-02-28T13:08:49+00:00 January 15th, 2019|Cyber Security, Security and Threats, Tips and Advice|

Sharing our personal information is a fact of life nowadays. Very few of us would be willing to sacrifice the convenience of purchasing goods and signing up for services online. However, as most of us are aware, there are risks when entrusting organisations to safely process and store our data. We may tend to believe [...]

Comments Off on Don’t be A hacker’s dream come true – follow our essential tips!

How to stop your email account getting hacked in 6 easy steps

2019-01-15T13:22:50+00:00 December 18th, 2018|Cyber Security, Security and Threats, Tips and Advice|

You’re a sitting target, under immediate threat Cyber crime is on the increase, and criminals are developing increasingly sophisticated ways to break through security walls. All they need to find is a weak spot, a door left open - so to speak, and they’re in. That weak spot? Your email account. Email accounts present a [...]

Comments Off on How to stop your email account getting hacked in 6 easy steps

Don’t Wait to Update: Run out-dated software at your peril

2019-01-23T09:12:58+00:00 December 14th, 2018|Security and Threats, Tips and Advice|

Perhaps updating your software is the last thing on your to-do list at this time of year? There’s lots going on and the last thing you need is your current task interrupted while you wait for an update to download. What’s more, there are so many of those annoying notifications – telling you your software [...]

Comments Off on Don’t Wait to Update: Run out-dated software at your peril

Is your data for sale on The Dark Web?

2018-12-03T10:08:49+00:00 November 29th, 2018|Security and Threats, Tips and Advice|

Most of us use the Internet many times a day, for both business and personal use. We have become very used to supplying whatever information is required, in order to access prod-ucts and services. This means more companies than ever hold information about individu-als, businesses and their clients. The data protection legislation, brought into force [...]

Comments Off on Is your data for sale on The Dark Web?

What lies beneath… Are you your own biggest security threat?

2018-11-08T10:45:11+00:00 October 22nd, 2018|Business Continuity, Security and Threats, Tips and Advice|

What’s the biggest risk to your company…IT security, poor software? No, people. The future security of your business and the sensitive information it possesses, all depends on those who use it. The GDPR has raised the stakes and business’ priorities when it comes to the proper usage and storage of information. Between now and 2021, [...]

Comments Off on What lies beneath… Are you your own biggest security threat?

5 key IT policies and procedures you really should have in place

2018-10-05T13:08:28+00:00 October 5th, 2018|Tips and Advice, Uncategorized|

So you have company policies coming out of your ears, and now you have been told that you need a whole new bunch of IT paperwork on top of it all? Worse still - your clients are asking to see the new paperwork. Where do you start and what do you really need? Here, we [...]

Comments Off on 5 key IT policies and procedures you really should have in place

Gone Phishing? How to deal with a phishing email

2018-09-26T09:28:55+00:00 September 26th, 2018|Technology News, Tips and Advice|

What is phishing? Technically speaking it is ‘the fraudulent attempt to obtain sensitive information for malicious reasons, by disguising as a trustworthy contact, normally in an electronic communication such as email.’ Realistically it’s every business owners nightmare. Staff clicking on a seemingly legitimate email and unlocking mountains of sensitive data, potentially causing a lot of [...]

Comments Off on Gone Phishing? How to deal with a phishing email

Road to recovery – top 5 immediate actions after a security breach

2018-09-26T09:24:00+00:00 September 26th, 2018|Security and Threats, Tips and Advice|

If you notice a breach in your business data, the first thing to do is identify how serious it is. Identifying whether information such as personal email addresses, dates of birth and payment accounts are taken, can have financial implications for your company, staff and customers. In the event of a breach you can take [...]

Comments Off on Road to recovery – top 5 immediate actions after a security breach