“You Have Been Hacked!” – Don’t Fall for This Common Scam

Hacked message

Have you ever received a terrifying email or SMS claiming someone has hacked your computer, watched you through your webcam and / or has our sensitive files? If so, you are not alone as these types of scam emails are becoming more common and are designed to frighten you into paying up. This blog article takes a closer look at how this scam works and why you should not worry. Continue reading

Cyber Security Is No Longer Optional – It Is Essential

Security Problems

Todays businesses heavily rely on the internet to operate and communicate, but with this comes a vital need: cybersecurity protection. Continue reading

Are You Lost in The Cybersecurity Jungle: Don’t Go Unprepared!

Cyber Security Jungle

Cybersecurity is like a jungle: a sprawling, bewildering landscape that businesses find hard to explore. As an IT Provider, we understand the uncertainty that comes with trying to navigate the complex world of cybersecurity. The jungle is vast, with threats hidden in the undergrowth if you set anything up incorrectly and the path to safety (and compliance) is not clear. Continue reading

What Cybersecurity Issues Are Hiding In Your Business?

Cyber Security

We are tend to ignore or put off issues that we don’t know about, think are too hard to fix or believe it won’t happen to me. Here are some of the most common cybersecurity issues faced by SMBs that that could leave your business in danger if left unchecked. Continue reading

MFA and Push Bombing

Cybersecurity
Online account hacking has become a major problem for both organisations and individuals. Think about how many online accounts you have that require a username and password both in your work environment and at home. Continue reading

What form of MFA Is The Best?

2FA / MFA Issues

With a lot of business processes now largely cloud-based, compromised passwords are the quickest and easiest way for bad guys to exploit computer systems. So how can you protect your online and offline accounts and data? The best way is with multi-factor authentication (MFA). See our blog article on Why Multi-Factor Authentication is Important.  Continue reading

8 Security Measures To Improve Your M365 Protection

Security TestingMicrosoft 365 (previously known as Office 365) is one of the best and most popular collaboration and productivity tools around. It provides users with seamless scalability, communication and supports remote work but as with all technology, it comes with its own particular security issues. Continue reading

Why You Shouldn’t Use SMS as your 2FA

2FA / MFA Issues

Every time you’re online and a site sends a separate code to check your identity, you’re using two-factor authentication. It has become the norm and if you are not doing this for all your online accounts then you should start straight away (check out our article on Why 2FA is Important). As with most things security wise, hackers have figured out how to get around the SMS code, too. This article shows you how they do it and how to stay safe. Continue reading