Helping your online customers feel safe

2020-09-22T08:01:08+00:00September 22nd, 2020|Categories: IT Security|Tags: , , , , , |

Helping your online customers feel safe Amidst a global pandemic and in a burgeoning economic crisis, people are feeling anxiety in all aspects of life. It is a situation that is driving consumers to the internet to purchase online. However, even here, your customer may be concerned that their details are not safe [...]

What you need to know about device drivers and IT security

2020-06-22T12:09:47+00:00June 22nd, 2020|Categories: IT Security|Tags: , , , , , , |

What you need to know about device drivers and IT security The 2017 WannaCry attack provided a case study in the importance of keeping operating systems updated and many companies (large and small) found themselves hastily updating their updates policy in the light of this event. While it is, clearly, necessary to keep operating [...]

Universities shown to be excellent places to go phishing

2020-06-22T11:48:06+00:00June 22nd, 2020|Categories: IT Security|Tags: , , , , , |

Universities shown to be excellent places to go phishing The UK is famous for the quality of its universities, which attract undergraduates, postgraduates and academics from around the world. It would appear, however, that when it comes to IT security, some of the staff at these institutions may not be as well-informed as you [...]

Email and GDPR: can you check your employees’ emails?

2020-06-26T07:53:18+00:00January 14th, 2020|Categories: Compliance, IT Support|Tags: , , , , |

Email and GDPR: can you check your employees’ emails? End users (in this case employees) and IT departments often see corporate email as being one of their major professional challenges, albeit for very different reasons. To end-users, the volume of email processed each and every day is often a time sink that can gobble away at their productivity, whereas to IT [...]

Don’t lose out on contracts because of inadequate cyber security

2019-12-18T16:13:33+00:00December 18th, 2019|Categories: IT Security|Tags: , , , |

Don’t lose out on contracts because of inadequate cyber security Research from Beaming has shown that 31% of UK businesses would cancel contracts with their suppliers if they believed that those suppliers were affected by a cyber attack. The security of one network depends on the security of the networks around them, and [...]

Data security – is the stick more effective than the carrot

2019-01-29T15:10:07+00:00January 29th, 2019|Categories: IT Security|Tags: , , , , |

Data security - is the stick more effective than the carrot While positive reinforcement is generally the most desirable way of bringing about changes in attitudes and behaviours, the hard fact remains that in the real world, a “carrot-and-stick” approach is often by far the quickest and most effective way to generate meaningful results. [...]

New Year resolutions for the security-conscious small business

2019-01-29T15:03:02+00:00January 29th, 2019|Categories: IT Security, IT Support|Tags: , , , , |

New Year resolutions for the security-conscious small business What would a new year be without a list of suggested resolutions? On top of vowing to go to the gym three times a week and never smoke again, you will want to check out these three resolutions for security-conscious small businesses. They may be more [...]

It’s people, not viruses, who threaten your cyber security

2018-06-08T09:13:04+00:00June 8th, 2018|Categories: IT Security|Tags: , , , , , , , |

It’s people, not viruses, who threaten your cyber security If Hollywood represented reality, cyber security threats would come from super-sophisticated computer geniuses working for super-villains, plotting the destruction of the world as we know it. In actual fact, the biggest threat companies face probably comes from inside their organisation and may come in the [...]

Cybersecurity spring cleaning you should do

2018-06-07T14:01:39+00:00June 7th, 2018|Categories: IT Security|Tags: , , , , , , , , |

Cybersecurity spring cleaning you should do Even though it really doesn’t look like it right now, it is, technically at least, spring. As everyone knows, then, that means it’s time for some annual deep cleaning. It’s good practice to extend your spring cleaning to your digital devices and, this year, there’s an extra [...]

State-controlled hardware and hackers: how safe is the UK’s infrastructure?

2018-05-02T11:17:48+00:00May 2nd, 2018|Categories: IT Security|Tags: , , , , , |

State-controlled hardware and hackers: how safe is the UK’s infrastructure? Cyber attacks are nothing new and it’s been many years since they moved out of the realm of science fiction and into the reality of the everyday world. Up until this point, cyber attacks have largely been attributed (officially at least) to cybercriminals, acting [...]

Load More Posts