Tips To Stay Safe While Using Hotel & public Wi-Fi

Public Wi-Fi has come a long way over the last few years in terms of improved security as many have realized that by offering this amenity, they are somewhat liable if their occupants get hacked while using it. Wireless access is now everywhere, on trains, in shopping centre and just about anywhere we meet other people. Nevertheless, it is still very …

Business broadband – A quick overview on the new broadband technologies

What is the difference between FTTP and SOGEA? We can help demystify what broadband service you need for your business. We match your business technological requirments with the most suitable broadband package. Our broadband solutions make us the perfect end-to-end supplier for your connectivity and communication requirements. Includiing IP telephony, video and conferencing services as well as instant messaging,

The role passwords play in a world of cybercrime

In previous articles we have described that there is a multi tiered approach to adopting cybersecurity. This is an ongoing process and needs to be constantly reviewed and improved upon. One very important aspect and should take priority, is safeguarding the use of passwords. For businesses, one weak password can be the cause of a major cybersecurity incident. For this …

How can your business stay vigilant in periods of “heightened” global cyber risk?

Following Russia’s attack on Ukraine, the National Cyber Security Centre has placed the cyber threat in the UK as “heightened”. The cyber challenge becomes increasingly complex as the hacktivists group Anonymous have become involved. Anonymous has apparently hacked into Russia’s media censorship agency and released 340,000 files in the latest undermining of Putin’s war media campaign. The reality is that …

How does Cloud Technology Benefit Not For Profits in 2022

Charities and voluntary sector businesses must operate at optimum and ensure they get the best value for money. Technology has become increasingly more and more important and if the systems don’t operate properly then this can affect time crtical service delivery and projects. If your charity or organisation has not moved across yet there are some key considerations to make. …

Key challenges of endpoint security

  The rise of hybrid working has forever changed how businesses must view their security posture. As employees are now working between multiple locations, the risk of data breaches, cyberattacks and network intrusion has grown exponentially. With employees working from home, it is more difficult for IT teams to ensure employees are following best practices to avoid an attack, and …

The Human Firewall: 6 steps to design effective cybersecurity training using your staff

The cybersecurity threat landscape is constantly evolving, and cyberattacks becoming more common with 4 in 10 businesses reporting having cybersecurity breaches or attacks in the past 12 months. There are many cybersecurity solutions available to strengthen a business’s security posture, including firewalls, endpoint protection and email security. However, for a business to safeguard themselves from a potential attack they must …

What do you do if you fall victim to a cyberattack?

Between 2020 and 2021, 4 in 10 businesses and a quarter of charities reported some form of cybersecurity breach or attack. These figures are increasing year-on-year as cybercriminals innovate with new attack vectors to infiltrate businesses for profit or to steal valuable data. For a business owner, if you have not already, now is the time to invest in a …

8 steps to successfully implement a BYOD programme

As employees return to the office, many businesses will be implementing a Bring-Your-Own-Device (BYOD) programme. There are many potential benefits of introducing a BYOD programme, including substantial cost savings, convenience for employees, and flexibility in work location. However, if your programme is not well planned, it carries a significant security risk. Employees may be using an unsecured device on a …

The 2021 Guide to How to keep your business safe from anywhere, on any device – Hybrid Working – Cyber Security

After months of working from home, restrictions have now eased, and many businesses have implemented a hybrid work model whereby employees work both in the office and remotely. This comes as no surprise as a recent survey found that 47% of employees would be likely to look for another job if their employer failed to offer flexible working arrangements. Hybrid …