3 things your business must look for in a password manager

Password managers are amazing pieces of software. They make it easy for you and your staff to stick to password best practice, while saving you time. Everyone wins.

Here are three things you must look for when choosing a password manager for your business.

Are you using Teams to share sensitive data?

Microsoft Teams has fast become one of THE most useful business tools for the way we work today.

No matter where your people work from, they can communicate and collaborate quickly and reliably.

But this remote way of working can also open the door to some MAJOR security issues.

New research shows that nearly HALF of employees frequently share confidential and sensitive files via Teams.

That can be a big problem if employees are using personal equipment rather than company issued kit… it’s simply not as secure as work devices.

Everything you need to know about password managers for your business

If you’re confused about password managers, you’re not alone.

A password manager is software that generates safe passwords, remembers them, and autofills logins for you.

That saves time. But means your business can quickly lock out staff when they leave.

Some people say they’re the best thing ever. Others are more negative.

We believe they’re a very useful business tool if you pick the right one. So we’ve created this new guide with the full lowdown on password managers for business.

Are you really downloading Zoom… or is it malware?

When you think about tools for remote working and chatting online, one of the first names in your mind is Zoom.

But its popularity has opened the door for cyber criminals. They’re using its name to steal sensitive data.

Researchers have discovered at least six convincing-looking download sites. They’re not the real thing. They’re designed to tempt you into downloading FAKE Zoom software, containing ‘info stealers’ and other forms of malware (malicious software).

Accidentally use one of these sites thinking that you’re downloading a Zoom update… and you risk having sensitive data stolen. Possibly your banking info, passwords or browser history.

Some can even steal your multi-factor authentication details. That could give cyber criminals access to your most sensitive data.

Make sure your cloud server is protected from this

Using a cloud server to drive your business’s technology is a smart idea.

The benefits are huge.

You can use as little or as much storage as you need, without having to worry about limitations or huge bills. Perfect for growing businesses.

Your team can access any data anywhere. Cloud servers were made for the hybrid work world we have today.

And you don’t need to use lots of your office space to house big servers and other equipment.

But when you’re using a cloud server, you must make sure it’s properly secured.

A recent report has revealed cloud servers are increasingly being used as an entry point for cyber criminals to launch attacks.

A Complete Guide To Phishing

How much do you really know about phishing scams?

Phishing is where someone sends you a fake email pretending to be someone else. They’re hoping you’ll click a bad link or download a dangerous attachment.

Our latest video looks at how you can protect your business from this dangerous crime.

None of your team would fall for this trick… would they?

Cyber criminals have a reputation for constantly coming up with new ways to scam us into handing over login details or sensitive data.

And while you might think your team would spot an attempted attack, you could be surprised. We’ve seen a lot of intelligent people – including many business leaders – caught out over the years.

One of the latest scams is very retro… and that seems to be why people are falling for it.

Cyber criminals have gone back to basics. They’re sending USB drives in the post.

The packaging and branding on the drives suggests they’re from Microsoft (they are not).

The story is there’s an updated version of Microsoft Office Professional Plus on the drive and it needs to be installed straightaway.

Are you using a malicious browser extension without realising?

There are hundreds of thousands of browser extensions designed to help us to save time, be more productive, and personalise our online experience.

And while the majority of them do what they’re supposed to, some are not designed to help you at all…

If you’re unfortunate enough to download a malicious browser extension without realising, it could harm your productivity and even flood your work with unwanted advertising.

This is known as adware. It’s a form of malware (malicious software) that’s designed to bombard you with unwanted adverts.

It can also change your search engine and send you to affiliate pages when you’re making purchases. These activities generate revenue for the extension’s creators.

In a recent report from a cyber security company, it revealed more than 4 million of its customers have been attacked by adware hiding in browser extensions over the last couple of years.

Passkeys could improve the way you work, forever

Back in May, we heard there would soon be a successor to the password – the Passkey.

Now, we’re hearing that Apple will start rolling out Passkeys in the next few months in iOS 16. And we’re excited.

Though it’s caused a bit of confusion. Apple is going to great lengths to market the Passkey, and understandably, people have assumed that it’s a feature exclusive to Apple.

That’s not the case.

In fact, Passkeys will be used in a joint effort to boost online security by Apple, Microsoft and Google. The reason Apple is promoting this new feature so hard is to get the message out there.

Microsoft and Google are also keen to spread the word so that people understand how Passkeys work.

If you’re under pressure to take urgent action – stop and think

Phishing scams are one of the biggest security threats to your business right now.

A massive 83% of organisations said they suffered successful attacks last year. And with just under a third of phishing emails being opened, the chances that someone in your business will be fooled are high.

But to make matters more difficult, cyber criminals have borrowed a technique from ransomware groups that is designed to panic people into taking action and giving away their login details.

This new kind of phishing attack begins like most others.

You get an email alerting you to potentially suspicious activity on your account. It might say someone is trying to login from a different location or device and the attempt has been blocked.

You’re then asked to click a link to verify your email address and password.

That’s worrying enough, right?