Posts

4 signs you’re under attack from ransomware

A ransomware attack is one of the most terrifying things that can happen to your business.

This is the computer attack where a hacker locks you out of your systems and data. And you must pay a ransom, typically in Bitcoin, to get access again.

What most people don’t realise is that hackers access your system weeks before they launch the attack. It takes time for them to set it up, and prevent IT security experts from helping.

So there are signs to look out for – ways to spot if your system has already been breached, and an attack is imminent.

Download our brand new guide and know how to keep your business safe.

If you would like to discuss this or have any other IT question, you can call us on 0207 241 2255 or simply fill out the contact form on our website and we’ll quickly get back to you. If you’d like to schedule a call directly with Ben, please connect via his calendar link.

Hackers want to break into your business email account!

Business Email attacks are becoming more common. And the result of an attack can be devastating!

Cybercriminals target businesses via email infiltration because they perceive enormous riches that may lie within.

This article describes the process.

In essence, the attacker will register a legitimate email account with the intention of impersonating their target and ultimately gain access to the target’s email environment.

They typically only use these addresses sparingly, believing that this will reduce the chance of detection, although they may return to the account after a long period or re-use it to target a different organisation.

Their goal is to obtain some key piece of information such as a bank account or password with which they can attempt to infiltrate a network or gain access to a highly privileged account.

What can you do?

Invest in email filtering that uses AI to sniff out suspicious emails.

Educate and train users to be alert to suspicious emails and how to spot “red flags” in all online interactions.

You won’t regret it.

If you’d like to discuss the above further please get in touch by calling 0207 241 2255 or simply schedule a session with me using my calendar link.

Are you set up for working anywhere?

Are you set up for working anywhere, on any device, at any time?

Didn’t 2020 just throw a massive curveball at us.

After the urgent rush to work from home in March, many businesses now have some staff still at home, with others in the office.

And it’s looking like (cliché alert) this will be the “new normal”.

Seeing as we don’t know what the next few years have in store us, this is a great time to make sure that all of your team can work from anywhere, on any device, any time.

That gives you maximum flexibility and minimum future disruption.

Download our guide to show you the most important things to consider with a permanent flexible working arrangement for your people.

If you would like to discuss this or have any other IT question, you can call us on 0207 241 2255 or simply fill out the contact form on our website and we’ll quickly get back to you. If you’d like to schedule a call directly with Ben, please connect via his calendar link.

 

 

 

 

Humans are responsible for cybersecurity – not technology

This blog is devoted to taking responsibility for cybersecurity in your organisation. If you are the leader or decisionmaker, who else is going to lead with this?

If you are not the decisionmaker, and there has been no cyber risk assessment, the organisation could be in trouble and may not recover from attack.

I recommend that you read Whaling for Beginners

You can obtain a free PDF or e-Book version from the link above.

In this short, based-on-fact and gripping modern-day fable, a company boss clicked on a link sent from an old (and presumed forgotten) school chum.

He regretted it immediately. The malware in the link proceeds to not only hack his company network, but their client’s networks too.

The book charts the fallout for the company but also forces the boss not only to take responsibility for his own culpability but also to realise that the tech alone does not protect you.

Without security policy, risk assessment and mitigation you are vulnerable.

“We took technology at face value. Technology is nothing without people. People use technology. They can use it and they can abuse it.

They can let it make them lazy, or they can use it to be amazingly creative. The point is, it’s a tool. It’s only as good as the people that use it. I’m the fool that clicked on a link in an email that I shouldn’t have.

I assumed that the antivirus would save me. I assumed that my firewalls, my expensive tech, my IT team made me immune to my own carelessness. They didn’t….”

If you’d like to discuss the above further please get in touch by calling 0207 241 2255 or simply schedule a session with me using my calendar link.

What is “Two Factor Authentication” and why should I use it?

You may have heard about Two-Factor (or two-step) Authentication (2FA) in the news or in a conversation. Unless you are an IT person this may mean absolutely nothing to you. However, we’re here to tell you how crucial it is to your online safety and also, how easy it is to set up. Read more

Are your staff unknowingly putting your business at risk?

BYOD (Bring Your Own Device) in the workplace basically means that employees are permitted to use their own devices (mobiles, laptops and tablets) to perform their work (for you). Whilst this makes sense on multiple levels, it is a potential minefield for your company’s data security!

Read more