Busting the top 5 cyber security myths In my capacity as the owner of an IT support and IT security business, I spend a lot of my time talking with owners of small and medium sized businesses. In these conversations I hear a lot of opinions about cyber security and I have discovered over the […]
Are you sending emails securely? Remember the days before we used email in business? If you cast your mind back a few decades there was a time when people used to write their messages down by hand on paper, put it in an envelope and send it in the post.
Zoom is such a great tool for remote working, but is it secure enough to be used in your business? That is what we’re going to look at in today’s blog post. Increased Demand Since remote working became a thing, businesses have needed a way to communicate with staff, partners and customers.
If you received an email from your manager asking you to pay £10,000 into a bank account urgently, would you do it? You might be surprised to hear that some people do. This type of scam is known as CEO fraud or CEO impersonation and it’s the topic for today’s blog.
In this blog we’re going to talk about what the best telephone system is for your business. IT and Telecoms The technology behind telephone systems has changed alot since I first came into the IT industry. The IT system and the telephone system used to be two different systems – provided and supported by two […]
What do you think is the biggest technology threat to your business? The answer is ransomware. In this blog, I will explain exactly what ransomware is, why you should be concerned and what you can do to protect yourself and your business. NHS Ransomware Attack Ransomware hit national headlines in the UK in 2017, when […]
In this blog, I am going to introduce you to two concepts. Those are backup and and a term called business continuity. As a business owner, it’s really important that you know what these two terms are and how important they are to your business.
In one of my previous blogs we talked about phishing attacks; what they were and how you can protect yourself against them. In this blog, we’re going to delve a little bit deeper and talk about how hackers use phishing attacks to steal your money. Phishing is easy Cyber criminals love to hack into email? […]
When we talk about Cyber Security, we always talk about it in a business context. But what about you as an individual? What about your family? Cyber Security applies to you too. In this blog, I am going to introduce you to my 3-step process for securing you and your family.
Most of us are now working from home. This isn’t an easy task. I have two children who need homeschooling. We have two dogs who are running around. In between all of this, we need to do our day jobs and run our businesses. Working from home also presents some technical challenges.