fbpx

Michael

Cyber security for the small organisation in the connected world

Cyber Attacks – What defences do you have?  

The best strategy for combating cyber attacks, is to adopt automation and 24/7 monitoring. In addition to the comprehensive monitoring capabilities of our software, we employ several other defences to protect against cyber threats. One crucial aspect of our strategy is the adoption of advanced automation techniques. We can swiftly respond to threats and minimise […]

Cyber Attacks – What defences do you have?   Read More »

Legacy

We had a customer passed our way this month who almost fell victim to “legacy.”   LEGACY is a term manufacturers and developers use to describe their older products which are no longer cost effective to support fully.  We are talking about things like Adobe Creative Suite 5, Microsoft Office 2013, first generation i7, even hybrid

Legacy Read More »

Running on fumes

Last year’s lockdowns made many businesses adapt to a remote working situation, and for many small and medium businesses this was quite simple. The high utilisation of Microsoft 365 Business and its cloud-based technology, designed around collaboration for multiple teams and external organisations, just meant not seeing our colleagues in person for many months.  Some large organisations rapidly implemented sterile working conditions and

Running on fumes Read More »

Microsoft 365 Security

Cyberattacks have skyrocketed since 2020, with probably the biggest driving factor being the global coronavirus pandemic and the necessity to work from home on insecure networks. Working remotely from colleagues has also left employees more vulnerable and as a result nearly 75% of businesses fell victim to some kind of phishing attack in 2020. The

Microsoft 365 Security Read More »

internet screen security protection

Security Built-in

We talk a big game when it comes to security. Our strategy has breadth as it uses products from multiple technology providers. It is multi-layered, using specific utilities to combat specific attack scenarios. And it provides excellent security for your business, giving you exactly the protection you need. No more, no less. And there’s good

Security Built-in Read More »

Risky business

You can’t create a security strategy without considering RISK.  Your business most likely takes in a lot of information from a lot of different places, even if it isn’t that digitally involved. If you have employees and if you bill customers (a safe assumption!) you will keep some details about them. Every point of data entry and storage is a risk point.  You can start to mitigate that risk by classifying

Risky business Read More »

Firmware

Firmware Attacks

Do you need to worry about this? Should firms be more worried about firmware cyber-attacks? – BBC News Most malware works at a “surface level” which is why, in most cases, the user must be tricked into allowing the malicious program to run. For example, clicking a link in an email or opening an attachment.

Firmware Attacks Read More »