Every time you’re online and a site sends a separate code to check your identity, you’re using two-factor authentication. It has become the norm and if you are not doing this for all your online accounts then you should start straight away (check out our article on Why 2FA is Important). As with most things security wise, hackers have figured out how to get around the SMS code, too. This article shows you how they do it and how to stay safe. Continue reading
Category Archives: Security
What You Need to Know about Security Testing
You want to keep your IT in top shape. Your business technology supports both your productivity and profitability. You do not want to be dealing with downtime. It is also good to avoid running afoul of any industry regulations or standards. But how does a business gauge their IT fitness? That’s where IT audits, security assessments and penetration testing come in. Continue reading
3 Ways You Can Get Infected With Ransomware
There’s been a lot in the news over the last few weeks about ransomware attacks. As the media can give people the wrong impression let me clear up some things for you. Continue reading
4 Signs You Are Not Budgeting Enough for IT
Every business wants to be cost-conscious as saving money in one area can make funds available to expand, develop new products or pay people more. That all makes good business sense. Continue reading
Everyone Plays a Role To Prevent Cybersecurity Issues
Hollywood films would have us believe that cyberattacks are elaborately planned and use expensive, sophisticated tools developed by hackers and geeks is sophisticated labs. But in real life, most hacks are nothing like that as the first steps cybercriminals take are to simply fool a human to gain access. Continue reading
What to Do If You Get Hit With Ransomware
If you get hit with ransomware there will be a number of indications, including:
- A screen telling you that your business files are encrypted.
- You can’t open any of your documents.
- Your files may have a weird extension of different icon.
- there will be instructions for how to pay up to recover your files.
This blog article details a number of steps you can take instead of paying the ransom straight away. Continue reading
Does Your Business Have An IT Strategy?
As a business owner you know the importance of planning and strategy. Without it, you have no aims, no goals, and in reality no direction.
While you probably spend a lot of time working on your strategy every month, quarter, or year, how much of that time is actually spent on your business’s IT strategy? Continue reading
What Is Shadow IT And Why Is It An Issue?
Shadow IT are the things that employees download onto a business system that management and / or the IT department doesn’t know about, and it can be a big problem. Continue reading
Don’t Change Your Password!
Back in the day, the advice was to change your passwords often.
That is now bad advice. Continue reading