fbpx

Our News, Tips and Advice

  • Hey! You with all the hats!

    If you are a business owner, you wear many hats, particularly whilst your company is growing.  Big corporates can employ specialists – management accountants, financial accountants, tax specialists, contracts lawyers, employment lawyers, recruitment specialists, marketing gurus – and the list goes on. You have to be all of those people, so how do you find…

  • We fix things after Power Cuts

    Power Cuts

    We fix things! We recently have had to deal with Power cuts and one of our largest clients. It is important to remember that a large network with multiple systems cannot be just switched on and off in quick succession. Rebooting a large network after a power outage is a critical task that requires careful…

  • Keep It Simple… Encryption (pt. 3)

    device encryption

    Encryption is the process of encoding information, converting it from plaintext into ciphertext, to protect it from unauthorised access. This process ensures that only those with the appropriate decryption key can access the original information, thereby maintaining confidentiality. Modern encryption techniques utilise complex algorithms and keys, making unauthorised decryption extremely difficult without the correct key.…

  • Cyber Security Policy

    Cyber Security and Humans

    In today’s digital landscape, the significance of implementing a robust cyber security policy cannot be overstated, particularly for companies operating within the UK. Such a policy serves as the cornerstone of an organisation’s defence against the ever-evolving threats posed by cybercriminals. A comprehensive cyber security policy should encompass a clear outline of employee responsibilities, data…

  • So you don’t think cyber security is for you?

    So you don’t think cyber security is for you?

    Don’t bury your head in the sand! If you have anti-virus, a firewall on your router, and keep your passwords secret, you probably think you have cyber security covered, but I have bad news for you – you haven’t. Cyber Security as an Investment If you have bought anti-virus software you have invested in cyber…

  • Spring Cleaning

    Spring Cleaning

    Spring cleaning is not only for your home, but also for your computer. A cluttered and dusty computer can affect its performance, security and lifespan. Here are some tips on how to clean up your computer and make it run faster and smoother. Delete unnecessary files and programs. Over time, your computer accumulates a lot…

  • Why has my email font changed?

    Why has my email font changed

    Why has my email font changed? Well the other day I was out onsite and questioned about the new font when sending email. Initially they thought they had a caught a bug. We soon found out that this was in fact a changed made by Microsoft. Microsoft has recently announced that it will change the…

  • The importance of a reboot!

    The importance of rebooting

    The other day we were asked to diagnose a fault with an application that wasn’t coming up with the correct text and boxes on it. In this instance it was a VoIP app on a PC. One of our engineers had suggested the importance of a reboot and it turned out that it wasn’t done…

  • What is Multi-Factor Authentication?

    Multi-Factor Authentication (MFA), also known as Two-Factor Authentication (2FA), is a method of authorising a login using multiple pieces of authentication. The pieces are usually defined as something the user has and something the user knows. For example, withdrawing money from a cash machine requires your valid credit or debit card (what you have) and…

  • Defence in Depth Part 4 Overview

    Defence in Depth

    If you have been following our posts on Defence in Depth you will be gaining an understanding of some of the products and services we can provide. This article is about the layers that need to be addressed in order to meet your Cyber Security goals. At the bottom of the article there are links…

  • More about your VPN

    use a VPN when away from your secure connections

    This is a follow-on article to my previous article Let’s Talk About Your VPN. You should read that article first, to save me having to explain what a VPN is and why I am talking about them now. VPN Issues I spent last week talking up the cyber security advantages of your VPN, but all…

  • Defence in Depth Part 3

    a reversing light used when backing up

    Welcome back once again for part 3 of Defence in Depth. The final layer of protection is the full endpoint (Local PC) backup. You can have all the protection in the world for your cloud environment however lots of important business critical data can and often is stored locally, however what happens when your computer…