How To Reduce Your Risk When You Lose Your Mobile Device

What You Should Do to Reduce Risk When Your Mobile Device Goes Missing

Few things invoke panic like a missing laptop, smartphone or tablet. People rely on these devices and they can also contain files, personal financials, apps, passwords, pictures, videos and much more. Continue reading

6 Discontinued Tech Tools You Shouldn’t Be Using

Discontinued Tech Tools

The one constant thing about technology is that it changes rapidly! Things that were once shiny and new can now be ancient and obsolete. New versions replace those old obsolete tools and the continued use of old technology can leave computers and networks vulnerable to attack. Continue reading

What Is Smishing?

What Is Smishing

You probably now receive a lot more text messages today from companies that you did a few years ago. This is due to businesses trying to bypass full inboxes. Retailers have joined the trend and are urging customers to sign up for shipping alerts via SMS. The medical industry has also joined the trend with doctors and dentists sending out SMS appointment reminders. Continue reading

What form of MFA Is The Best?

2FA / MFA Issues

With a lot of business processes now largely cloud-based, compromised passwords are the quickest and easiest way for bad guys to exploit computer systems. So how can you protect your online and offline accounts and data? The best way is with multi-factor authentication (MFA). See our blog article on Why Multi-Factor Authentication is Important.  Continue reading

7 Signs That Your Computer Is Infected With Malware

Infected Systems

Malware (short for malicious software) is an umbrella term that encompasses many different types of malicious code including:

  • Viruses
  • Spyware
  • Ransomware
  • Adware
  • Key loggers
  • Trojans
  • And more

Continue reading

Think Before Sharing Your Documents

Sharing Files

Cloud sharing makes it very easy simple to share files (documents, presentations, spreadsheets etc). In SharePoint, OneDrive, Dropbox, Google Drive you can simply click on a document and click “share”. A link is created, which you can then copy into an email. That done, you can move on to your next “to do” without thinking about it any longer. Continue reading

6 Ways to Stop Social Phishing Attacks

6 Ways to Stop Social Media Phishing Attacks

Phishing is the number one method of attack for everything from ransomware to credential theft. Email phishing is the main method for delivery but other delivery means are on the rise. Continue reading

8 Steps To Protect Company Data When People Leave

Protect Company Data When Staff Leave - eBookPrioritize data security when employees leave 

Businesses need to expect that one in five of their employees to leave in an average year. You can be doing all you can to retain your people, but what are you doing to protect company data when some do leave? Our eBook, 8 Steps Protect Your Company Data when People Leave explores: 

  • Risks to sensitive information when people leave your business.
  • Best practices to protect your business data 
  • Ways an IT service provider can help secure your business data.

Our latest eBook shares strategies to help fight employee turnover in the first place and also .

Click here to download our eBook on “8 Steps To Protect Company Data When People Leave”.

Phishing Attack Trends to Be Aware of in 2022

Phishing Attack Trends

Phishing remains one of the biggest dangers to every business’s security as it is the main delivery method for all types of cyberattacks. Cisco’s 2021 Cybersecurity threat trends report shows that at least one person clicked a phishing link in around 86% of organizations and suggests that phishing accounts for around 90% of data breaches. Continue reading

The Power of a Password Manager

Password Managers

All of us like to think that we are unique and that thinking extends to our passwords too, right? We are special and distinct, and no one could guess our specific combination of letters, numbers and symbols. Well, did you know that it is very easy for computers to very quickly determine passwords. So, using a password manager is a great move, as you can securely store your passwords in an easily retrievable way. But is your master password for your password manager secure, original and long enough? Continue reading