How do I protect my business from a cyber attack?

it security - ransomware

A question we get asked a lot by customers, contacts, friends and new business clients is how to protect your business from a cyber attack. The answer is complex and there is no quick fix or definitive list that works for every company alike.   Every business has a unique makeup and design of their … Read more

A cyber-attack could stop the country

cyber-attack-london-it-support

Superfast 5G mobile broadband will power smart cities and the internet of things (IoT) devices, but as more and more get connected, telecoms security advisors warn that cyber-attacks could increase in severity and in frequency. Smart homes adds to the risk Homes are getting smarter with smart cars, thermostats, video doorbells, internal and external cameras, … Read more

Job Opportunity – Part Time Office Administrator

Amazing-Support-job-add-image-with-the-right-colours

ABOUT US We are an IT company offering Managed IT Support and IT security to SME’s in and around the Greater London area. We are a small but dedicated team who aim to offer ‘amazing’ support and service across all elements of the business and not limited to client facing roles. We are based in … Read more

“Sextortion” Phishing Scam Blackmailing People with their Passwords

If you’re on the internet and use multiple passwords, you need to be aware of phishing scams. To put it simply, a phishing scam is when an individual attempts to steal personal information from you by posing as someone trustworthy, e.g., a well-known corporation. The latest phishing scam that’s going around is one that leads … Read more

Meltdown & Spectre Vulnerability Update

Meltdown Spectre Vulnerability

“Meltdown” & “Spectre” Vulnerability Update   We are aware of the two recently discovered CPU (processor) vulnerabilities, currently named Meltdown and Spectre. These vulnerabilities affect most modern processors (including Intel and AMD) and allows unauthorised access to privileged system memory. At this point, there are no known exploits of this vulnerability and it has only been publicly disclosed. A security update … Read more

Achieving HM Cyber Essentials through Self-Assessment – Part 3

cyber essentials

If you missed part 1 & 2 on our series about HM Cyber Essentials, you can read those here and here.   Part 3 – The 10 Steps to Cyber Security Step 1 explains why an information risk management regime is central to an organisation’s overall cyber security strategy as organisations continue to rely on … Read more

6 Services That We Offer That You Probably Didn’t Know About

Managed IT Support Services

At Amazing Support, we offer a lot of services –including Managed IT Support, Cloud Solutions and IT Consultancy. However, you might not know that we can offer even more than that! Here is an overview of some of our additional IT support services available for your business.   1. Office Relocations Moving office is just … Read more

Does backing up Office 365 make sense?

office-365-backup

Performing backups are about as exciting as watching water boil. Let’s face it, no one is excited to do backups, just like no one is excited to pay for car insurance.  However, just like car insurance it is most appreciated when “things” hit the proverbial fan.  Think of backups as digital insurance policies whose benefit … Read more

The Small Business Ransomware Guide

ransomware

Nothing fills an IT Manager or Director’s mind with angst and trepidation more than the utterance of ransomware. It is like the digital incarnation of the bogeyman, a children’s folktale that scared kids into fitful sleep.  Merely, mentioning the word in a security meeting would send the room into immediate silence.  The crazy thing is … Read more