What is Multi-Factor Authentication (MFA)?

What is multi-factor authentication (MFA)? MFA is one of several simple security measures you can use to raise the protection level for your business. Our latest video explains what, how and who you need to start using it in your business.

See how one click could shutdown your business

If your business uses computerised systems and let’s face it, most do, one of the biggest risks to it these days is ransomware. Hackers break into your IT systems and lock your files and hold your data to ransom.

One click is all it can take to start the shutdown of your business. Without access to data many businesses can be unable to operate.

We asked a certified ethical hacker to break into three computers using different types of attack. He filmed it from both ends – as the hacker, and what was happening on his victims’ machines.

Is your biggest security threat to your business on your payroll?

Insider attacks on your business –  the costs and your strategy to prevent insider attacks

Most insider attacks are not malicious, stead they are accidental, but the chances of attacks coming from inside your business are high.

A member of staff clicking on a bad link by mistake is all it takes.

But there are some attacks caused by malicious attackers, deliberately looking to do damage to your systems, or make money.

Both of these kinds of attacks can be prevented and minimised by focusing on five key areas in your IT strategy.

Read our new guide now to assess how prepared your business is.

What to do if you click a bad link on your phone

What should you do if you click a bad link on your mobile phone?

Many of us have done it and then realised it wasn’t what we thought it was.  What might have done in the background on your phone?

The first thing is not to panic. But, you must then quickly take action.

Take a look at out latest video for help

9 Types of Malware – an easy to read guide

There are billions of malware variants and all businesses are being target by them, all the time.

Malware is malicious software that is design to either damage or steal your data

We’ve written an easy to read (hopefully) guide to the top nine most common types on malware.

Data Security: What if your office is on fire?

Not something you want to happen but it does happen.

Fire causes damage but so will the water typically used to put out the fire.

If there had been a fire in your office last night, what do you wish you’d done yesterday?

Computers can be replaced and are usually covered by insurance but what about the data on them. Yes you can get business insurance to get you back on your feet but you can’t just recreate all that data that has typically grown over many years.

That’s one of the many reasons we need to protect and back up data.

Have a read of our data protection guide. It will show you things you need to prioritise to keep your data protected from any disaster.

Data Security: Are you locking the doors but leaving the windows open?

Most of us will take care to make sure our homes and cars are secure. We lock the doors, close the windows and, in some cases, lock them.
Sadly some business owners do the equivalent of locking the doors but leaving the windows open and even worse, some will leave the doors and windows open when it comes to their business’s data security.

Your 5 step plan to prepare and protect your business from cyber-crime

Some type of incident relating to cyber-crime was reported by two thirds of all organisations a couple of years ago.

That number is going to be higher now due to changes we have made in the last year to work from home, possibly in a rush, creating further opportunities  for fraud.

Overall the world economy loses more than $1 trillion to cyber-crime every year. That’s a figure that’s increased by over 50% since 2018.

Your business needs to be as prepared as it can be against the threat of cyber-crime.

Ransomware: How to spot an attack before it does real damage

Ransomware attacks are on the rise and they are one of the most troubling things that can happen to your business and its data.

Hackers take control of your computers, cloud accounts, network and encrypt all your data, making it unusable. They won’t undo the damage unless you pay a “ransom” fee.

They can do so much damage because they secretly break in to your system a long time before the attack is launched but you can keep an eye out for symptoms you’ve been breached and hopefully take back control before it is too late.

Top 5 Phishing Scams: How many have you heard of?

Which of these phishing scams have you heard of?

You’ve probably all heard of phishing.

This is where someone send you an email, pretending to be someone else (like your bank), to try to get sensitive information from you.

How about vishing? Or smishing? Or even whaling?

These are all forms of phishing designed to steal your information, and ultimately your money.

We explore each one in our brand new video.

The more aware you and your staff are; the better protected you’ll be.