Posts

Hackers want to break into your business email account!

Business Email attacks are becoming more common. And the result of an attack can be devastating!

Cybercriminals target businesses via email infiltration because they perceive enormous riches that may lie within.

This article describes the process.

In essence, the attacker will register a legitimate email account with the intention of impersonating their target and ultimately gain access to the target’s email environment.

They typically only use these addresses sparingly, believing that this will reduce the chance of detection, although they may return to the account after a long period or re-use it to target a different organisation.

Their goal is to obtain some key piece of information such as a bank account or password with which they can attempt to infiltrate a network or gain access to a highly privileged account.

What can you do?

Invest in email filtering that uses AI to sniff out suspicious emails.

Educate and train users to be alert to suspicious emails and how to spot “red flags” in all online interactions.

You won’t regret it.

If you’d like to discuss the above further please get in touch by calling 0207 241 2255 or simply schedule a session with me using my calendar link.

We all know what GDPR is but what is PECR?

We all know what GDPR is but what is PECR?

As this helpful guide from the Information Commissioner’s Office explains, The Privacy and Electronic Communications Regulations (PECR) sit alongside the Data Protection Act and the GDPR. They give people specific privacy rights in relation to electronic communications.

PECR specifically looks at the electronic communications an organisation or business makes and how to ensure compliance with the regulations.

In essence, this relates to how an organisation sends communications out, such as marketing emails, texts and other methods of contact.

It may not be the most exciting thing to spend your time on but it’s an important legal and administrative process that requires time and resources.

Even if it’s not something you do yourself, this proves it needs to be done by someone!

A quick online search will give you lots of templates and guidance on how to approach assessment of what your business needs to do and produce the documents that demonstrate your compliance.

If you’d like to discuss the above further please get in touch by calling 0207 241 2255 or simply schedule a session with me using my calendar link.

 

It is the fastest growing crime on the planet…

Ransomware is terrifying. Just terrifying.

It is the fastest growing crime on the planet but what does ransomware mean to you?

Imagine switching on your work computer one morning. And instead of the screen you normally see, the screen has gone totally red.

There’s a message telling you your business’s data has been locked. And the only way to get it back is to pay thousands in Bitcoin.

This is not a rare event. It happens to businesses every day. Every business is at risk. And it’s one of the hardest things for us as your IT support company to fix.

Fortunately there are five really effective things you can do to protect your business. Download our latest guide. It tells you how to protect your business, and dramatically reduce your chances of being attacked.

It is important to take a long-term approach to this, just as you would with any form of cyber-attack.  It’s cheesy, but prevention is better than cure!

If you don’t already have these precautions in place, you can call us on 0207 241 2255 or simply fill out the contact form on our website and we’ll quickly get back to you. If you’d like to schedule a call directly with Ben, please connect via his calendar link.

Humans are responsible for cybersecurity – not technology

This blog is devoted to taking responsibility for cybersecurity in your organisation. If you are the leader or decisionmaker, who else is going to lead with this?

If you are not the decisionmaker, and there has been no cyber risk assessment, the organisation could be in trouble and may not recover from attack.

I recommend that you read Whaling for Beginners

You can obtain a free PDF or e-Book version from the link above.

In this short, based-on-fact and gripping modern-day fable, a company boss clicked on a link sent from an old (and presumed forgotten) school chum.

He regretted it immediately. The malware in the link proceeds to not only hack his company network, but their client’s networks too.

The book charts the fallout for the company but also forces the boss not only to take responsibility for his own culpability but also to realise that the tech alone does not protect you.

Without security policy, risk assessment and mitigation you are vulnerable.

“We took technology at face value. Technology is nothing without people. People use technology. They can use it and they can abuse it.

They can let it make them lazy, or they can use it to be amazingly creative. The point is, it’s a tool. It’s only as good as the people that use it. I’m the fool that clicked on a link in an email that I shouldn’t have.

I assumed that the antivirus would save me. I assumed that my firewalls, my expensive tech, my IT team made me immune to my own carelessness. They didn’t….”

If you’d like to discuss the above further please get in touch by calling 0207 241 2255 or simply schedule a session with me using my calendar link.

Are you saving your passwords to Chrome?

Saving passwords to Chrome may be quick and simple, but is the right thing to do? We all know that remembering passwords is the bane of our internet lives. Security experts, such as IT Managed Services Providers, along with IT security companies repeatedly state how passwords are typically the weakest link in any business security model. Photographic memory aside, human beings struggle to hold multiple unique passwords in their heads. Therefore, anything which provides a short cut is deemed welcome. Read more

Cyber security in the supply chain…

A recent Microsoft security survey confirms what we all thought: Cyber-Security in the “Supply Chain” is a big issue! Read more

Five terrifying password security stats!

Yes, we’re talking about password security again. Why? Because huge data breaches continue to happen. Every. Single. Day. This month’s guide will quickly give you pause for thought when it comes to protecting your business with regards to passwords. Read more

What actually is a password manager?

Like most of us, juggling 25 unique 18 character passwords in our heads is a big ask. And then remembering which one works with which account can be frustrating, let alone if you are forced to change one. The modern approach is to use a password manager. Read more

GDPR: don’t bury your head in the sand!

GDPR six months on… burying your head in the sand is a terrible idea! The ostrich effect is common among humans. We bury our heads in the sand to avoid unpleasant information and pretend that everything is ok, even if the world is falling apart around us. Read more

Malware in the Cloud: risks and what you can do…

According to research conducted by the Cloud Industry Forum (yes, there is such a thing!), 88% of companies have now adopted some form of cloud computing. But what is cloud computing? Well, it’s where you use software in your browser, rather than having to download it to your computer. Read more