Does your business use MFA?

If you have Multi-Factor Authentication (MFA) then you are entering two pieces of information to login to your apps and/or devices. This could be your password and an additional “factor” like your fingerprint, text code to your mobile phone or an MFA app.

Cyber criminals are using ever increasingly sophisticated techniques to guess your password or even bypass security. This means that the more barriers you can put up, the more difficult it becomes for them to break into your systems.

Everyone and especially businesses, should be using MFA as it provides great protection against cyber attacks and other security threats.

Out new guide will tell you all you need to know. And it’s free to download.

3 essential security tools for every business

Your data is one of your most valuable business assets. Keeping it safe should be one of your main priorities. So if you don’t have much security in place, there’s a minimum standard you should be implementing, right now.

There are dozens of security solutions available that all perform different tasks – from preventing criminals gaining access, to recognising attacks in progress, and then limiting the damage that can be done. There’s no one-size-fits-all as every business has different priorities and different types of data to protect.

Here are three essentials that every business should put in place as a basic level of protection.

All businesses should adopt MFA. Now

Multi-Factor Authentication (MFA) adds extra layers of security to your business.
It means you need at least two pieces of information to log in to a device or an app. Perhaps a password plus a fingerprint, and possibly an extra, single-use code sent to your phone.

Here’s why we recommend that all businesses should adopt MFA right now.

Microsoft 365 makes Multi-Factor Authentication easier

Microsoft is planning to enable Multi-Factor Authentication (MFA) directly in its Outlook app for many 365 business users.

MFA is a vital tool to help protect your online accounts from cyber criminals. It works by generating a second, single-use passcode every time you log into an account. It’s usually sent to an authenticator app on your phone that you have to download and set up first.

Security codes can also be sent via SMS text message, by a phone call, or you might be given a special USB key to plug into your computer.

The process is often made quicker by using a biometric login like your fingerprint or face ID. It’s a minor chore, but the protection it offers far outweighs the couple of extra seconds it takes to access your account.

Are your productivity tools actually slowing you down?

Productivity tools are supposed to make you more, well… productive.

But if they’re not embedded properly within your business, tasks can actually end up taking longer than they should. That’s frustrating for employees and you. It wastes time, and it costs money – which is the opposite of being productive.

So how can this happen?

Often a lack of consistent training means everyone is using tools differently, or finding their own workarounds. Maybe the tools haven’t been properly integrated with other apps, creating additional work. Or perhaps employees simply don’t find some tools useful and give up on them.

Bringing new technology into your business can be a big step – so big that lots of owners try to avoid it completely. That might be because of understandable risk aversion, or because they simply don’t have enough information to choose the right solution from the thousands of available options. It doesn’t help that nearly all tools work differently and offer different advantages.

Bot malware is a growing security threat

If we talk about ‘bots’ you’d be forgiven for thinking of the amazing AI chatbots that have been all over the news lately.

But this isn’t a good news story. Bots are just automated programs, and bot malware is a worrying new security risk you need to defend your business against.

Malware bots are particularly dangerous because they steal whole user profiles – that’s a complete snapshot of your ID and settings. This potentially allows cyber crooks to bypass strong security measures like Multi-Factor Authentication (MFA).

The 3 most important areas to discuss with your technology partner (jargon-free)

IT support is a technical job, and some of the language used can be a bit, well… technical.

So here’s our jargon-free look at the 3 most important areas to discuss with your technology partner.

Don’t forget your phone when you think about cyber security

Our phones are a goldmine of private information. Just think of all the financial details, personal messages, banking apps, photos and contact information that live behind that little glass screen.

And if your team use phones for work, they’ll often have access straight into company systems – email, contact lists, network access, file systems. So if they’re not kept as secure as any other device in your workplace, they can become a gaping hole in your cyber security.

Criminals know this, of course, which is why they target us through our phones just as much as they do through our networks and servers.

But cyber crime isn’t the only concern. Just losing your phone, or having it stolen, can put your data at huge risk.

tKnow IT Jargon Buster: Learn to talk Tech

Does IT jargon feel like an alien language? We steer clear of tech talk as much as possible when we’re working with our clients. But next time you need help with an IT issue, it could save you a lot of time if you have a few words of lingo in your locker.

That’s why we’ve created our new, free IT Jargon Buster. It’s a great A-Z of just some of the terms you might hear when you’re talking with an IT expert.

Let’s start talking about AI

The whole world is suddenly talking about Artificial Intelligence.

From Alexa in your kitchen, to Siri on your phone, AI is already all around us, but new names like ChatGPT, Dall-E, Jasper and more feel like they’ve blown up the internet.

These new concepts take things WAY further, helping us to write articles, search the web with natural conversation, generate images, create code, and introduce new ways to make our daily lives even easier.

But emerging technology nearly always launches in a blizzard of geek-speak before it settles into everyday life. Early PC users might remember the ‘DOS prompt’. And when did you ever have to ‘defrag’ your phone?

Experts believe that these new AI tools will become the building blocks of a whole new world of tech, redefining the way we interact with computers and machines.

So let’s help you decode some of the terms you’ll hear this year.