When you run a small business there are a lot of tasks that you need to keep on top of to ensure your business keeps running. Most businesses rely upon technology such as Windows and know that they release updates on a regular basis, some of which seem to cause us more issues than you […]
We are always hearing about cyber criminals have attacked a company’s data or there has been a security breach that has leaked data from a website that you have recently signed up for or used to order something. Have you ever wondered how they cyber criminals got access? Most of us will have received an […]
This week the National Cyber Security Centre have been running their CyberUK Online 2021 events on YouTube, if you have missed any of the presentations and discussions visit: https://www.youtube.com/channel/UCyAPLAtCSeL1s85YMY8ULnw The event is promoting best practices in Cyber Security and speakers from key industries sectors and Government discuss how to build a safe Cyber ecosystem […]
On 2nd March Microsoft issued an Exchange Server patch alert, this related to on-premises Exchange Server version 2010, 2013, 2016 and 2019. Online version of Exchange including Office 365 are not affected. The zero-day vulnerabilities were being exploited by hackers around the world and could pose a threat to the data on the servers. Microsoft […]
Scammers are often sophisticated criminals who use many different methods in trying to obtain personal and company information. They trick millions of people every year and in the current health crisis scamming is on the rise. Below are some of the methods that scammers use and how to check if you are being scammed or […]
IT Security constantly evolves to help protect client’s data and systems from unwanted access. For most businesses, the IT systems used will include file storage, email & database. Typically word, excel, PowerPoint to create documents and store client information in databases (often called a CRM – Customer Relationship Manager). What the business might not see […]
Many businesses have found over the last few months that their staff can work from home and can still be productive. Cyber attacks can affect every business and now that users are working from more remote locations, we are seeing a higher number of targeted phishing emails which may fool some staff. Typically, most businesses […]
With the ability for staff to work from home and a new cyber attack in the news each week, what is protecting your systems? Threats come in a number of forms, from hardware/software failure, user error or malicious act by internal or external persons. The ability to protect the critical data from these threats is […]
Office 365 provides infrastructure resilience with high availability for its systems. However, data protection remains the customer’s responsibility. Office 365 Email provides a deleted item folder within outlook which is emptied by the user or outlooks settings and has the ability to recover some deleted items for up to 30 days after their deleted date. […]
How you decide what is the best data storage for your business comes down to what you really need, as well as what you would be most comfortable with using. You have the option of using either on-site data storage or the cloud, however there are pros and cons for both. On-site Data Storage: Requires an […]
- 1
- 2