fbpx

Our News, Tips and Advice

  • What is Multi-Factor Authentication?

    Multi-Factor Authentication (MFA), also known as Two-Factor Authentication (2FA), is a method of authorising a login using multiple pieces of authentication. The pieces are usually defined as something the user has and something the user knows. For example, withdrawing money from a cash machine requires your valid credit or debit card (what you have) and…

  • Defence in Depth Part 4 Overview

    Defence in Depth

    If you have been following our posts on Defence in Depth you will be gaining an understanding of some of the products and services we can provide. This article is about the layers that need to be addressed in order to meet your Cyber Security goals. At the bottom of the article there are links…

  • More about your VPN

    use a VPN when away from your secure connections

    This is a follow-on article to my previous article Let’s Talk About Your VPN. You should read that article first, to save me having to explain what a VPN is and why I am talking about them now. VPN Issues I spent last week talking up the cyber security advantages of your VPN, but all…

  • Defence in Depth Part 3

    a reversing light used when backing up

    Welcome back once again for part 3 of Defence in Depth. The final layer of protection is the full endpoint (Local PC) backup. You can have all the protection in the world for your cloud environment however lots of important business critical data can and often is stored locally, however what happens when your computer…

  • Let’s Talk About Your VPN

    Pine Lake Resort portable office with a VPN

    I am on holiday for the next two weeks – some cold weather walking in the Lake District and the Cairngorms, whilst Diana stays back in the warm office – so it must be time to discuss VPN usage again. The photo above is the view whilst I write this article. A VPN – your…

  • Defence in Depth Part 2

    Defence in Depth

    Welcome back! If you haven’t read part 1 about “Defence in Depth” please check it out, otherwise let’s look at the next stage of defence in the cyber security theatre of war. Remote Monitoring and Management (RMM) RMM is a toolbox of programs, a swiss army package, taking care of lots of tasks which historically…

  • Defence in Depth Part 1

    Defence in Depth

    “Defence in depth is a strategy that leverages multiple security measures to protect an organisation’s assets. The thinking is that if one line of defence is compromised, additional layers exist as a backup to ensure that threats are stopped along the way” SaaS Defence in Depth Microsoft 365 is used by millions and is an…

  • Here is Your Next Cyber Security Step

    cyber security

    Are you still unclear about the benefits our clients get from our cyber security stack and Security Operations Centre? Are you not sure that you want to take the next step in better cyber security? Cyber Security Webinar John O’Mahony, one of the keynote speakers from the recent Connect London 2023 conference, will present a…

  • We do cover Christmas and New Year IT and cyber security calls

    Computer Christmas Time

    Although we all have time off over Christmas and the New Year – the nature of the work we carry out for clients means that we never really stop. Computers and IT infrastructure can have issues any time and cyber security incidents are unpredictable. We have emailed all our clients telling them about our Christmas…

  • What does our SOC do?

    Beach Computer

    It is easy for us to say, “You need our Security Operations Centre (SOC)” but then we are often asked, “What will that do for us?”. Here is a real-life example showing how the SOC keeps a constant watch for unusual activity in your systems. Remembering that unusual activity could mean a threat or attack.…

  • Windows Pro – Do you need it?

    Microsoft Windows

    For a very long time nearly all Windows computers were sold in one of two flavours, Windows Home and Windows Pro. There have been variations but those two are the most widespread. The use cases are obvious, but that’s not to say you cannot use either for both. If your business I.T. needs are very…

  • A Geek Present for Christmas 2023

    geek presents

    We’re back. It is that time of year again when some of you out there in internet land need a gift for a geek partner, spouse, siblings, friend, relation, boss, etc., etc., etc. – I am here to help. Here is my personal selection, various prices, all geeky. There may be that ideal gift on…