Creating and implementing a Computer Use & IT Security Policy will help protect your business from a number of risks, including cyber attacks, data loss, fraud and reputation damage. The exact content of your policy will depend on the type […]
This is a question we’re often asked by our clients – and with good reason, as it can be a hazy area. In fact, the terms are often used interchangeably. And to add to the confusion, many people do actually […]
Online fraud is reaching unprecedented levels, with 6.9 million cases reported every week according to Take Five Stop Fraud, a new HMRC and Microsoft awareness campaign. One of the biggest culprits is unsolicited or ‘phishing’ emails – messages that purport […]
A new version of the CryptoMix ransomware malware is causing mayhem to businesses around the world – as one of our clients has found to their cost. We recently received a stressed phone call from the client after they discovered […]
After many large, global organisations’, including the NHS, IT systems were brought to their knees by WannaCry in May 2017, UK businesses are more aware than ever of the dangers of ransomware. But just knowing about it isn’t enough. Your […]
Does your business have a disaster recovery plan in place? If not, it’s something you need to think seriously about implementing, to make sure your business can survive and continue trading if your IT systems are damaged or destroyed by […]
Did you know that the number of cyber crime attacks are now head-to-head with ‘traditional’ crime figures, accounting for 50% of all reported crimes? In 2016 alone, there were 5 million reported cases, costing the UK economy an eye-watering £192 […]
OR Do you delegate key IT housekeeping tasks to Junior team members? You might want to think again! It’s common practice in many smaller organisations for business-critical IT tasks to be given to junior members of staff. Take the daily […]
SMEs have the same concerns and requirements in regard to security as do their much larger partners. In today’s’ economic climate the need to provide an effective security environment around any business and its activities is a given for all […]