How do I protect my business from a cyber attack?

it security - ransomware

A question we get asked a lot by customers, contacts, friends and new business clients is how to protect your business from a cyber attack. The answer is complex and there is no quick fix or definitive list that works for every company alike.   Every business has a unique makeup and design of their … Read more

A cyber-attack could stop the country

cyber-attack-london-it-support

Superfast 5G mobile broadband will power smart cities and the internet of things (IoT) devices, but as more and more get connected, telecoms security advisors warn that cyber-attacks could increase in severity and in frequency. Smart homes adds to the risk Homes are getting smarter with smart cars, thermostats, video doorbells, internal and external cameras, … Read more

TLS encryption v1.2 now the only encryption in Office 365

To provide best-in-class encryption to customers, Microsoft plans to discontinue support for Transport Layer Security (TLS) versions 1.0 and 1.1 in Office 365 from October 31st 2018. Now although these TLS versions have no known security issues, due to the potential for future attacks and other TLS vulnerabilities, they have made the decision to stop … Read more

Job Opportunity – Part Time Office Administrator

Amazing-Support-job-add-image-with-the-right-colours

ABOUT US We are an IT company offering Managed IT Support and IT security to SME’s in and around the Greater London area. We are a small but dedicated team who aim to offer ‘amazing’ support and service across all elements of the business and not limited to client facing roles. We are based in … Read more

“Sextortion” Phishing Scam Blackmailing People with their Passwords

If you’re on the internet and use multiple passwords, you need to be aware of phishing scams. To put it simply, a phishing scam is when an individual attempts to steal personal information from you by posing as someone trustworthy, e.g., a well-known corporation. The latest phishing scam that’s going around is one that leads … Read more

How Variants in Ransomware are Neutralizing Data Backups

How Variants in Ransomware are Neutralizing Data Backups

There are some sophisticated criminals online. They come in the form of hackers, who use ransomware as collateral against corporate companies to hold their data hostage. This is typically executed through an email attachment. The FBI typically advises against paying the ransom because there is no guarantee that your data will be recovered. This means … Read more

Phishing Testing To Train Your Employees

We’re very pleased to announce that, in assocation with Webroot, we have launced an amazing new service. Phishing Testing with Security Awareness Training (SAT) enables us to send out a customised, real-world spam phishing email that seeks to collect valuable information from your employees. For example, their username, email address and network password. Don’t worry, … Read more

CompTIA UK Channel Community Conference 06/18

It was fantastic to attend the latest CompTIA UK Channel Community Conference in Birmingham last week. We also had pleasure in our Director, Jamie, who spent time talking to the IT community about how we grew our business, the successes, the failures, the high high’s, the low low’s before introducing his good friend Marcus Cauchi from … Read more

We’re giving Cyber Security Lunch ‘n’ Learns

Criminals continually find new ways to exploit business networks, steal and ransom sensitive data and financial assets. It’s more crucial than ever to understand if your business is exposed to cyber security threats and then to do something about it. We’re going around London and Hertfordshire giving businesses Cyber Security Lunch ‘n’ Learns to improve cyber … Read more

The Power of Outsourcing and Why Your Company Should

Power of Outsourcing

What do major companies like Ford, Google and Apple have in common besides being global brands? Billions of dollars in revenue probably comes to mind, but the willingness to outsource is another shared feature and what we’ll be examining in this article. If brands that have reached the level of success as those above are … Read more

Meltdown & Spectre Vulnerability Update

Meltdown Spectre Vulnerability

“Meltdown” & “Spectre” Vulnerability Update   We are aware of the two recently discovered CPU (processor) vulnerabilities, currently named Meltdown and Spectre. These vulnerabilities affect most modern processors (including Intel and AMD) and allows unauthorised access to privileged system memory. At this point, there are no known exploits of this vulnerability and it has only been publicly disclosed. A security update … Read more