How do I protect my business from a cyber attack?

it security - ransomware

A question we get asked a lot by customers, contacts, friends and new business clients is how to protect your business from a cyber attack. The answer is complex and there is no quick fix or definitive list that works for every company alike.   Every business has a unique makeup and design of their … Read more

TLS encryption v1.2 now the only encryption in Office 365

To provide best-in-class encryption to customers, Microsoft plans to discontinue support for Transport Layer Security (TLS) versions 1.0 and 1.1 in Office 365 from October 31st 2018. Now although these TLS versions have no known security issues, due to the potential for future attacks and other TLS vulnerabilities, they have made the decision to stop … Read more

Achieving HM Cyber Essentials through Self-Assessment – Part 2

cyber essentials

If you missed part 1, you can read that here.   Part 2 – The Basics The Cyber Essentials scheme was developed by government and industry to fulfil two specific functions: To make a clear statement regarding the basic controls that all organisations should implement so that they can mitigate the risk from common Internet-based … Read more

CASB: The Final Cloud Security Solution

Cloud security

With the advent of more and more malware and viruses attempting to attack your business from seemingly the far corners of the earth, many are recommending cloud computing as the best way to keep your business safely running while making absolutely positively sure your data stays safe and secure. Of course, the malware and virus … Read more

Why you should save to the Cloud and not your Desktop

cloud-storage

It’s been over a decade since the term “Cloud” was bandied about. Since then it has been absorbed into the social vernacular and its purpose has been made clear.  One of its more notable uses is data and information storage.  With the popularisation of apps like DropBox, Box.com and Google Drive even a luddite can … Read more

The Small Business Ransomware Guide

ransomware

Nothing fills an IT Manager or Director’s mind with angst and trepidation more than the utterance of ransomware. It is like the digital incarnation of the bogeyman, a children’s folktale that scared kids into fitful sleep.  Merely, mentioning the word in a security meeting would send the room into immediate silence.  The crazy thing is … Read more

The New Gatekeeper Of The Clouds

Cloud Access Security Brokers - CASB

Cloud Access Security Brokers (CASB), it’s a mouthful to say so just stick to the acronym from here on out. But make no mistake, if you deal with the cloud at all (and these days who isn’t?) then you’re going to want to pay close attention because there’s a new sheriff in town and it’s … Read more

Over 90% of FTSE companies are expecting a cyber attack this year

business it security

Over 90% of Chief Information Security Officers (CISOs) at FTSE 100 and FTSE 500 companies have said that they expect to be targeted and hit by some form of cyber attack this year in 2016. Not only is this worrying but despite being abundantly aware of this threat, almost three quarters don’t believe they have adequate security measures in … Read more

Cryptolocker – Its threat, its legacy and why you should still keep your guard up

cryptolocker-computer-network-virus

In the summer of 2013 a seemingly harmless trojan started infecting Windows computers and when it was taken down 9 months later it had succeeded to extort $3 million dollars from victims. Cryptolocker used the existing Gameover ZeuS botnet and a host of infected email attachments to spread itself all over the internet. When it … Read more

To Host or Not To Host, That is the Question

4 Reasons Why You Should Pay More for Enterprise Web And App Hosting

This is the scratchy head topic that all forward-thinking businesses deliberate on It is a subject of great financial debate for companies, small to large and the decision to host or not to host can either save you money or pour much needed cashflow from your IT budget straight down the drain. However, there is … Read more