Image by athree23 from Pixabay

Looking for ‘Mr Right’…from the Start? Tips on Finding the Perfect IT Support Partner

With Valentine’s Day looming, cards & hearts appearing in all the shops and Lindor introducing their valentine’s chocolate box (yum!), we’re jumping on the band-waggon and turning our attention to helping you find the perfect <IT Support> Partner! Are you looking for a team with a GSOH? Or perhaps a Partner who is DTE (down…

Photo by Towfiqu Barbhuiya on Unsplash

The Most Common Passwords in the World: What to do if yours is on the list

Do you use any of these extremely popular – and eminently hackable – passwords? If so, Philip Muncaster from our security partner, ESET, has a New Year’s resolution for you! Security experts have been predicting the death of the password for well over a decade. But it’s still the main way we log-in to our online accounts…

Become Cyber Secure with Cyber Essentials

Become Cyber Secure with Cyber Essentials

We are delighted to have recently completed our Cyber Essentials Accreditation and are now helping several customers achieve theirs too. This is a government-backed scheme that will help protect your organisation, whatever its size, against a whole range of the most common cyber-attacks. With Cyber hackers becoming more intelligent and adapting to many counter-hacking measures,…

Photo by Michael Geiger on Unsplash
|

5 Ways to Stop Cyber-Attacks in their Tracks

How secure are your systems and data? Are your systems regularly monitored for cyber-attacks? Can you be sure any security breaches are stopped in their tracks immediately? Dealing with advanced threats is the most significant concern for cybersecurity professionals and organisations these days. With system downtime, disruption of business operations and reduced productivity costing businesses…

Photo by Markus Spiske on Unsplash

How to Create Complex and Unique Passwords you won’t forget?

The first rule of passwords is, “We do not use the same password everywhere.”The second rule of passwords is “WE DO NOT USE the same password everywhere!” There have been plenty of well-publicised losses of data by various organisations where user names, email addresses and passwords have been obtained. You may have never actually purchased…

Photo by Ilya Pavlov on Unsplash

How to check if your PC has been hacked, and what to do next

Are you concerned that your PC has been hacked? Whatever happens, don’t panic! Here Philip Muncaster from our security partner, ESET, explains ten signs that show your PC has been hacked and gives you handy tips on how to fix it. Global cybercriminals make trillions of dollars each year. Much of their success comes from exploiting the…

Photo by NASA on Unsplash

Defending the Data Centre: The time to act is now

As the war in Ukraine sadly continues, so does the potential for further escalation in kinetic hostilities. At the same time, the odds that the conflict may lead to major cyberattacks against targets beyond Ukraine’s borders seem to shorten. This has put the world on heightened alert, and one critical component of today’s digital-centric world…

Photo by Towfiqu barbhuiya on Unsplash

5 ways hackers steal your password – & how to stop them!

The concept of the password has been around for centuries and one reason for the enduring popularity of passwords is that people know instinctively how they work. But there’s also a problem, as Phil Muncaster from our Security Partner, ESET, goes on to explain. Passwords are the Achilles’ heel of the digital lives of many…

Is the Future Passwordless?

Is the Future Passwordless?

Passwords definitely have their disadvantages so could passwordless authentication be the answer? As Microsoft further nudges the world away from passwords, Phil Muncaster from ESET explains what your organisation should consider before going password-free. For such a clumsy sounding word, “passwordless” actually promises to make life a lot easier – for both users and security teams….

Beware of these 5 common scams on Instagram

Beware of these 5 common scams on Instagram

From phishing and clones, to romance and verification badge scams, Amer Owaida at our Security Partner, ESET, explains the most common tactics fraudsters use to trick us on Instagram. Instagram is one of the most popular social media platforms. Indeed, with over one billion monthly active users it is among the top four most popular social media networks in…

Photo by CardMapr on Unsplash

Beware of Black Friday Scams

With Black Friday and Cyber Monday fast approaching, consumers are being warned to be vigilant when shopping in this week’s sales, with a rise in scams expected to cost shoppers millions. Police said crime over the Black Friday and Cyber Monday period last year defrauded online shoppers in Britain of £2.5m. Many never received goods they ordered from…

Protect your Business against Ransomware

Protect your Business against Ransomware

With Ransomware increasingly in the news, it is worth remembering the current advice on how best to protect our businesses against Ransomware and ensure these security procedures are in place and fully supported company-wide. 1. Run Software Updates Are you ever tempted to skip software updates as they take up valuable time and perhaps seem…

Image: Detox by Nick Youngson CC BY-SA 3.0 Alpha Stock Images

Seasonal Switch-Off for Digital Detox & Downtime

In today’s society, we all seem so busy, juggling the many hats we wear, often over-committing and feeling under significant time pressure. Technology, specifically social media, can sometimes be the cause of this. Seeing the happy faces of friends and family enjoying festivities can lead to a feeling of FOMO (Fear of Missing Out), whilst…

Image: Christmas shaped gingerbread (Photo: Petr Kratochvil via MGN Online)

Christmas Shopping – Compassion, Cookies & Scams!

With less than a month to go now until Christmas Day and Black Friday on the horizon, here are a few things to consider when carrying out your Christmas shopping online! Compassionate Christmas Shopping Did you know that there are sites which give a percentage of your spend as a charitable donation every time you…

Image by Gerd Altmann from Pixabay

Be Smart & Not Scared by these Scams!

Changing situations present new opportunities for the dishonest minority and scams, whether by email or telephone, are no exception and are constantly being adapted to spoof the unsuspecting. Many of us will have received emails advising that we are in line for a small fortune of overseas wealth……subject to confirming our banking details or covering…

Image by Tumisu from Pixabay

5 Key Considerations for Effective Communication in the Workplace

Communication is key to a successful business these days but just what is key to successful communication? With information being exchanged through a variety of communication channels both internally and externally, an organised set up and system for each chosen communication channel will help your company run efficiently, boost productivity and reduce stress. Companies and…

Image by silviarita from Pixabay

Christmas Compassion, Cookies & Seasonal Shopping Scams

With twinkly lights going up, shops stocking up on mince pies and the first of the mulled wine being sampled, it’s beginning to feel a little like Christmas..! And no doubt lots of you are much more organised than us and have even actually started Christmas shopping already! Well, for those of you turning your thoughts to…

Image: Pikrepo, CC0 1.0 Universal

Computer-Aided Learning in the Classroom

With the start of school for the autumn term and my children now tackling the challenges of year 2 and foundation, I’m continuously learning how computers are changing the educational experience within the classroom. It was recently announced in the weekly electronic newsletter – incidentally delivered via the ParentMail app on our phones – that…

Don’t be spooked by GDPR – Be Aware & Prepare for changes in Data Protection Regulations

Don’t be spooked by GDPR – Be Aware & Prepare for changes in Data Protection Regulations

With the General Data Protection Regulations (GDPR) coming into force on 25th May 2018, we take a look at the initial strides you can take in ensuring your data and IT systems will be fully compliant. The changes in regulations may seem a little daunting but hopefully, as with everything, breaking them down into more…