Helping your online customers feel safe

2022-01-12T20:09:39+00:00September 22nd, 2020|Categories: IT Security|Tags: , , , , , |

Online Security - How to ensure your customers are safe Amidst a global pandemic and in a burgeoning economic crisis, people are feeling anxiety in all aspects of life. It is a situation that is driving consumers to the internet to purchase online. However, even here, your customer may be concerned that their [...]

What you need to know about device drivers and IT security

2020-06-22T12:09:47+00:00June 22nd, 2020|Categories: IT Security|Tags: , , , , , , |

What you need to know about device drivers and IT security The 2017 WannaCry attack provided a case study in the importance of keeping operating systems updated and many companies (large and small) found themselves hastily updating their updates policy in the light of this event. While it is, clearly, necessary to keep operating [...]

State-controlled hardware and hackers: how safe is the UK’s infrastructure?

2018-05-02T11:17:48+00:00May 2nd, 2018|Categories: IT Security|Tags: , , , , , |

State-controlled hardware and hackers: how safe is the UK’s infrastructure? Cyber attacks are nothing new and it’s been many years since they moved out of the realm of science fiction and into the reality of the everyday world. Up until this point, cyber attacks have largely been attributed (officially at least) to cybercriminals, acting [...]

Do you need a regular cybersecurity audit?

2018-05-02T10:51:45+00:00May 2nd, 2018|Categories: IT Security|Tags: , , , , |

Do you need a regular cybersecurity audit? Another week, another security breach, or at least that’s how it can seem sometimes. So far this week, we’ve had Hudson’s Bay, Panera and Under Armour all reporting data thefts. They are not the first companies to do so this year and while it would be nice [...]

The role of CFOs and CMOs in cyber security

2018-04-11T12:29:39+00:00April 11th, 2018|Categories: IT Security|Tags: , , , , , |

The role of CFOs and CMOs in cyber security The internet has made it possible for people to work together even when they are on different continents and yet there seems to be nothing technology can do to erase the barriers that can stop different departments from fighting over competing priorities and internal territorial [...]

Cyber Essentials Certification & IASME Governance

2022-01-22T18:29:22+00:00October 2nd, 2017|Categories: IT Security|Tags: , , , , |

IASME Cyber Essentials & Governance Certification IASME Cyber Essentials Certification is a must have for every organisation.  Cyber security in general, and data security in particular, have never been more important that is currently.  Large or small, you should take them very seriously and get certified. With that in mind, here is a [...]

Charities are a ‘soft touch’ in cyber security terms

2018-01-04T16:01:35+00:00September 6th, 2017|Categories: IT Security|Tags: , , , , |

Charities are a ‘soft touch’ in cyber security terms Research was carried out earlier this year to identify issues with cyber security within third sector, or charity, organisations. 30 in-depth interviews were carried out to establish attitudes towards cyber security, awareness of relevant issues, approaches to cyber security and the charities’ perceptions and experiences [...]

Password Alert! Are you at risk?

2018-01-04T14:53:02+00:00August 22nd, 2017|Categories: IT Security|Tags: , , , , , , , |

Password Alert! Are you at risk? Are you guilty of using an over-simplified password that a dedicated hacker could uncover as quickly as you can say ‘internet security’? This website lets you test your password and will tell you how long it would take a computer to break into your account. If you find [...]

IT Support Companies – What people are looking for

2021-12-14T20:16:08+00:00August 22nd, 2017|Categories: IT Support|Tags: , , , , , , , , |

IT Support companies - What people are looking for Organisations engage the services of IT Support Companies for a number of reasons. IT is central to any modern business, whether it’s to manage customer relations or measure stock, or to host a website or manage communications. Increasingly, businesses use voice-over-IP (VoIP) services rather [...]

Go to Top