Blog

Data! How much can you afford to lose?

Data! How much can you afford to lose?

When you’ve thought about disaster planning for your business, what are the key things you’ve considered? Hardware failure, software corruption, cyber attacks, power outages, natural disasters? These are all critical, of course, but linked to them is something that can have an even more damaging effect on your day to day operations - an inability to access your data.

What do you do if disaster strikes?

What do you do if disaster strikes?

Imagine your worst nightmare. You have your own small business and one night get a call from the police saying your offices have been burgled.

You dash down there to find the situation is every bit as bad as you feared - all your PCs and laptops have been taken - in fact, every single piece of electronic equipment.

The Phishermen Have Upped Their Game

The Phishermen Have Upped Their Game

And they caught a whole new school of minnows
Earlier this month, we received reports of very large numbers of users receiving an email from Microsoft, asking them to verify their email account.

Those users who clicked on any of the hyperlinks were taken to a different website, where they were encouraged to “verify their email account” by inputting personal and account information, along with passwords.

Making a Success of Mobile Working

Making a Success of Mobile Working

Or Part 2 of Why Should We Go to Work? Why Can’t the Work Come to Us?
If you read the last part of this article “The Joys of Mobile Working” and you’ve decided that you want to make the change, you need to know just how to make mobile working work for everyone involved.

The Joys of Mobile Working

The Joys of Mobile Working

Or Part 1 of Why Should We Go to Work? Why Can’t the Work Come to Us?
In early 2018, the Work Foundation, a research group based at Lancaster University, produced a detailed report on mobile working. The title of that report was PRODUCTIVITY, TECHNOLOGY & WORKING ANYWHERE and if you are interested in improving the performance of your business, you should take the time to read it.

GDPR Compliance Is Providing Cover for Phishing Attacks

GDPR Compliance Is Providing Cover for Phishing Attacks

Every problem is an opportunity, even for the bad guys
So the big day (25.05.18) has come and gone and the General Data protection Regulations (GDPR) are now in full effect. If you haven’t been able to achieve compliance with the new regulations, which are intended to give improved protection of personal data to all EU citizens (Even in the UK), you need to act NOW.
Here’s what the EU says about this important and far reaching legislation:

“The EU General Data Protection Regulation (GDPR) replaces the Data Protection Directive 95/46/EC and was designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens data privacy and to reshape the way organizations across the region approach data privacy.

Mobile Device Management and Encryption

Mobile Device Management and Encryption

What it is and why you need it NOW… by numbers.
Here are some simple facts of life about the use of IT in modern businesses.

People are using more devices of different kinds to work on. We used to use PCs and we now use PCs, laptops, tablets and smartphones.

Spies Like Us

Spies Like Us

Why we are all on the front line in the new cold war
What is going on?
This week, the American Government issued a statement accusing the Russian Government of organising or orchestrating cyber-attacks on key elements of American infrastructure. Specifically, they claim that, over the past few years, Russian hackers have launched a string of attacks aimed at nuclear power plants, water supply companies and other vital elements of public infrastructure.

Phishing for Fun and Profit

Phishing for Fun and Profit

Phishing is one of the most common criminal frauds reported at the moment. Attacks are becoming ever more sophisticated, with criminals going to greater lengths to succeed. Over the past couple of years, use of the fraudsters’ favourite tactic has doubled, so how exactly does it work?

In a phishing attack, a criminal sends you an email or other electronic communication such as an instant message, pretending to be someone you trust.

icon-Request-a-call-back

Call Now

Having an IT crisis?
Need someone you can rely on?
Give us a call today