Posts

Are you set up for working anywhere?

Are you set up for working anywhere, on any device, at any time?

Didn’t 2020 just throw a massive curveball at us.

After the urgent rush to work from home in March, many businesses now have some staff still at home, with others in the office.

And it’s looking like (cliché alert) this will be the “new normal”.

Seeing as we don’t know what the next few years have in store us, this is a great time to make sure that all of your team can work from anywhere, on any device, any time.

That gives you maximum flexibility and minimum future disruption.

Download our guide to show you the most important things to consider with a permanent flexible working arrangement for your people.

If you would like to discuss this or have any other IT question, you can call us on 0207 241 2255 or simply fill out the contact form on our website and we’ll quickly get back to you. If you’d like to schedule a call directly with Ben, please connect via his calendar link.

 

 

 

 

We all know what GDPR is but what is PECR?

We all know what GDPR is but what is PECR?

As this helpful guide from the Information Commissioner’s Office explains, The Privacy and Electronic Communications Regulations (PECR) sit alongside the Data Protection Act and the GDPR. They give people specific privacy rights in relation to electronic communications.

PECR specifically looks at the electronic communications an organisation or business makes and how to ensure compliance with the regulations.

In essence, this relates to how an organisation sends communications out, such as marketing emails, texts and other methods of contact.

It may not be the most exciting thing to spend your time on but it’s an important legal and administrative process that requires time and resources.

Even if it’s not something you do yourself, this proves it needs to be done by someone!

A quick online search will give you lots of templates and guidance on how to approach assessment of what your business needs to do and produce the documents that demonstrate your compliance.

If you’d like to discuss the above further please get in touch by calling 0207 241 2255 or simply schedule a session with me using my calendar link.

 

It is the fastest growing crime on the planet…

Ransomware is terrifying. Just terrifying.

It is the fastest growing crime on the planet but what does ransomware mean to you?

Imagine switching on your work computer one morning. And instead of the screen you normally see, the screen has gone totally red.

There’s a message telling you your business’s data has been locked. And the only way to get it back is to pay thousands in Bitcoin.

This is not a rare event. It happens to businesses every day. Every business is at risk. And it’s one of the hardest things for us as your IT support company to fix.

Fortunately there are five really effective things you can do to protect your business. Download our latest guide. It tells you how to protect your business, and dramatically reduce your chances of being attacked.

It is important to take a long-term approach to this, just as you would with any form of cyber-attack.  It’s cheesy, but prevention is better than cure!

If you don’t already have these precautions in place, you can call us on 0207 241 2255 or simply fill out the contact form on our website and we’ll quickly get back to you. If you’d like to schedule a call directly with Ben, please connect via his calendar link.

Humans are responsible for cybersecurity – not technology

This blog is devoted to taking responsibility for cybersecurity in your organisation. If you are the leader or decisionmaker, who else is going to lead with this?

If you are not the decisionmaker, and there has been no cyber risk assessment, the organisation could be in trouble and may not recover from attack.

I recommend that you read Whaling for Beginners

You can obtain a free PDF or e-Book version from the link above.

In this short, based-on-fact and gripping modern-day fable, a company boss clicked on a link sent from an old (and presumed forgotten) school chum.

He regretted it immediately. The malware in the link proceeds to not only hack his company network, but their client’s networks too.

The book charts the fallout for the company but also forces the boss not only to take responsibility for his own culpability but also to realise that the tech alone does not protect you.

Without security policy, risk assessment and mitigation you are vulnerable.

“We took technology at face value. Technology is nothing without people. People use technology. They can use it and they can abuse it.

They can let it make them lazy, or they can use it to be amazingly creative. The point is, it’s a tool. It’s only as good as the people that use it. I’m the fool that clicked on a link in an email that I shouldn’t have.

I assumed that the antivirus would save me. I assumed that my firewalls, my expensive tech, my IT team made me immune to my own carelessness. They didn’t….”

If you’d like to discuss the above further please get in touch by calling 0207 241 2255 or simply schedule a session with me using my calendar link.

Cyber Essentials for Your Business: Why It Makes Sense…

How secure is your business’s cybersecurity? Do you take adequate care of customer and client data as well as your own? Even if you’re confident in your systems and protocols, it can sometimes be difficult to demonstrate. It’s important that your business has the right controls and also the credentials to back them up. Read more

What is “Two Factor Authentication” and why should I use it?

You may have heard about Two-Factor (or two-step) Authentication (2FA) in the news or in a conversation. Unless you are an IT person this may mean absolutely nothing to you. However, we’re here to tell you how crucial it is to your online safety and also, how easy it is to set up. Read more