Learning Centre

Get all your questions answered about cyber security, managed services, backup strategies, compliance and best practice.

Showing articles in 'Cyber Security'...(« back to knowledgebase)
Showing 23 articles.
Cyber Security
One of the weakest links in all IT and Internet systems is the requirement to have a password to log in to a device or service. We all have several passwords to remember, and typically we tend to simplify what we need to enter. Having 48 unique passwords, all 23 characters long with symbols in […] (Read more)
Cyber Security
We get asked this question regularly and there are several factors to consider. Is my creative business really vulnerable or is it just hype? Risk: What should we be protecting? How do we know if the data is really safe? Will any of this security protection interfere with your workflows and existing practices? Are we […] (Read more)
Cyber Security
Mobile phone security – do your team use their own smartphones for work? Having work email accounts and possibly data on personal smartphones is commonplace for many businesses. The convenience of being able to quickly access important mail, documents or other key pieces of information on the move is one compelling reason. Another is the […] (Read more)
Cyber Security
Better the devil you know… In many of these articles, I repeatedly discuss the importance of a layered approach to IT security. Threats to both your physical and information assets come from a wide range of sources, each with their preferred delivery method. We’ve discussed what a prepared business needs to do in order to […] (Read more)
Compliance Cyber Security
The information audit. What’s that? What information do you have and how do you look after it? I have become increasingly vocal about organisational risk analysis relating to data. As part of any risk analysis strategy, knowing what data is held by a company, where it is and who has access to it are three […] (Read more)
Compliance Cyber Security
The data audit: where do you store your personal data? How do you keep it safe and can you get it back post-disaster? The Data Protection Act 2018 (DPA) requires organisations to “know” where it stores its Personal Identifiable Information PII. That it is secure and that your systems are robust enough to recover your […] (Read more)
Cyber Security
Let’s be clear, having a secure and resilient IT system for your business is not optional. Downtime will cost you in several ways. And a serious cyber breach can cost you your reputation, potential fines from the ICO (Information Commissioner’s Office) and ultimately, could sink your company. Not convinced? Well, let’s have a rapid-fire maths […] (Read more)
Cyber Security
Ransomware is a particularly malicious attack where a piece of pernicious software has found a way to be run on one of your organisation’s devices. The “bad app” will actively seek out commonly used files – such as Office documents, images etc. and encrypt them. The unfortunate recipient will see a notice warning them that […] (Read more)
Compliance Cyber Security
During the transition to lockdown and getting used to a decentralised work environment, your focus has probably been to manage this change and ensure that you and your team stabilise overall cohesion and productivity. Quite right too. The collective shock-to-the-system will affect most of us and it takes a little getting used to. This certainly […] (Read more)
Cyber Security
Security awareness training must be the cornerstone of any organisation’s IT strategy… Having to deal with IT security and the layers of protection that can be placed between your intellectual property/data and the rest of the world can be an overwhelming prospect. But you have a trusted IT partner (ITGUYS) who can manage this for […] (Read more)
Cyber Security
Passwords – every so often, we read about data breaches of big internet players – like Yahoo, Dropbox and TalkTalk. As if that isn’t scary enough, consider this for a moment: that all these passwords may be aggregated and put together in one searchable location? Any cracked password? Sites like haveibeenpwned, who have been around for a long […] (Read more)
Cyber Security
You may have heard about Two-Factor (or two-step) Authentication (2FA) in the news or in a conversation. Unless you are an IT person this may mean absolutely nothing to you. However, we’re here to tell you how crucial it is to your online safety and also, how easy it is to set up. Two Factor? Yes – when you […] (Read more)
Cyber Security
It’s easy to believe that cyber criminals are not interested in your business because you’re not a big household name, or don’t have thousands of staff across dozens of locations. Sadly, that hasn’t been true for some time. These days, cyber criminals don’t go after specific targets. Instead, they release malware and other bad software […] (Read more)
Cyber Security
Use a Mac? No antivirus? Still think Macs don’t get viruses? Here at ITGUYS, we are pretty easy going when it comes to what kind of computer you use. We like Macs. We like PCs. But what we don’t like is a computer without security protection. Macs definitely get fewer viruses than PCs – and […] (Read more)
Cyber Security
Most people run their computers with administrative privileges. Often this is because you have always done it and have not considered a) the consequences of this and b) that there is another way! If a malicious app or “BADGUY”  gains access to your computer and you are logged in with admin privileges, this means that […] (Read more)
Cyber Security
Don’t be fooled, being a small business doesn’t protect you from the bad guys who want to exploit you! Forbes analysis of a cyber security survey by Opinium makes startling reading… One statistic was concerning: 63% of small businesses experienced some form of cyber breach in 2018 – up from 47% in 2017. One paragraph really […] (Read more)
Cyber Security
Have you seen the latest password haul that identified over 87GB of passwords and data clouted on a hacker’s website? Are you worried? Well, you should be! Just take a look at this article in the Register. One of the biggest worries for IT  is identity security and the relative weakness of passwords entered by humans. […] (Read more)
Cyber Security
Saving passwords to Chrome or any other browser may be quick and simple, but is it the right thing to do? We all know that remembering passwords is the bane of our internet lives. Security experts, such as IT Support companies, along with IT security companies repeatedly state how passwords are typically the weakest link […] (Read more)
Cyber Security
Just how confident are you that your organisation could stand up to a cyber-attack? Has your company had a risk assessment done? OK, so you have an IT plan. You update your computers, have anti-malware and have an office firewall. All good stuff: but does it actually keep you safe? How can you tell if […] (Read more)
Cyber Security
Want to know why security awareness training should be part of your IT security policy? Any well-adjusted business nowadays knows all about cyber-crime. It knows about the risks posed and how important it is to have a coherent IT security strategy in place. This is so that if or when something bad happens, they are […] (Read more)
Cyber Security
This article is devoted to outlining who should take responsibility for cybersecurity in your organisation.  If you are the leader or decisionmaker, who else, apart from you, is going to lead with this? If you are not the decisionmaker, and there has been no cyber risk assessment, the organisation could be in trouble and may […] (Read more)
Cyber Security
Business Email attacks are becoming more common. And the result of an attack can be devastating! Cybercriminals target businesses via email infiltration because they perceive enormous riches that may lie within. This article describes the process. In essence, the attacker will register a legitimate email account with the intention of impersonating their target (you) and ultimately gain […] (Read more)
Cyber Security
A ransomware attack is one of the most terrifying things that can happen to your business. This is the computer attack where a hacker locks you out of your systems and data. And you must pay a ransom, typically in Bitcoin, to get access again. What most people don’t realise is that hackers access your […] (Read more)