Be prepared: your business WILL be attacked

5 steps to improve your ransomware resilience

Ransomware is the one of the most terrifying and concerning data security threats your business will face.

What if your staff try to login one morning but all they see is a bright red screen saying your data has been encrypted, and you must pay a huge ransom in Bitcoin to get it back.

Terrifying? Concerning?

Read our new guide now. We’ll answer all your questions about ransomware. Plus you’ll discover five steps to improve your business’s ransomware resilience.

How to turn off the password manager in Chrome

I recommend that you use an external password manager rather than the browser version. If you try to use both it can be confusing and time consuming. Turn off the browser password manager.
This video shows you how to turn off the password manager in Chrome

Does your IT always need fixing? It’s time for a Proactive IT Partner

If you or your current IT support company are always fixing your tech then it’s probably time to consider an IT partner who can proactively prevent problems.

Download and read our latest guide that highlights the benefits for your business of a more proactive approach to your tech.

What is Multi-Factor Authentication (MFA)?

What is multi-factor authentication (MFA)? MFA is one of several simple security measures you can use to raise the protection level for your business. Our latest video explains what, how and who you need to start using it in your business.

Microsoft 365: 10 Apps you didn’t know you had

Boost productivity, save time, and improve customer experience

Microsoft 365 has many features to be discovered. Most businesses get it just to access Word, Excel, PowerPoint and Teams. And then they discover there are so many other apps included.

Find the right ones and you can save time, increase productivity and motivation, and create a smoother workflow for everyone in your business. With more of us working remotely, that’s never been more important.

we’ve put together a useful guide. Here are the 10 Microsoft 365 apps we think every business should look closely at.

Is your biggest security threat to your business on your payroll?

Insider attacks on your business –  the costs and your strategy to prevent insider attacks

Most insider attacks are not malicious, stead they are accidental, but the chances of attacks coming from inside your business are high.

A member of staff clicking on a bad link by mistake is all it takes.

But there are some attacks caused by malicious attackers, deliberately looking to do damage to your systems, or make money.

Both of these kinds of attacks can be prevented and minimised by focusing on five key areas in your IT strategy.

Read our new guide now to assess how prepared your business is.

Data Security: What if your office is on fire?

Not something you want to happen but it does happen.

Fire causes damage but so will the water typically used to put out the fire.

If there had been a fire in your office last night, what do you wish you’d done yesterday?

Computers can be replaced and are usually covered by insurance but what about the data on them. Yes you can get business insurance to get you back on your feet but you can’t just recreate all that data that has typically grown over many years.

That’s one of the many reasons we need to protect and back up data.

Have a read of our data protection guide. It will show you things you need to prioritise to keep your data protected from any disaster.

Data Security: Are you locking the doors but leaving the windows open?

Most of us will take care to make sure our homes and cars are secure. We lock the doors, close the windows and, in some cases, lock them.
Sadly some business owners do the equivalent of locking the doors but leaving the windows open and even worse, some will leave the doors and windows open when it comes to their business’s data security.

Ransomware: How to spot an attack before it does real damage

Ransomware attacks are on the rise and they are one of the most troubling things that can happen to your business and its data.

Hackers take control of your computers, cloud accounts, network and encrypt all your data, making it unusable. They won’t undo the damage unless you pay a “ransom” fee.

They can do so much damage because they secretly break in to your system a long time before the attack is launched but you can keep an eye out for symptoms you’ve been breached and hopefully take back control before it is too late.

Top 5 Phishing Scams: How many have you heard of?

Which of these phishing scams have you heard of?

You’ve probably all heard of phishing.

This is where someone send you an email, pretending to be someone else (like your bank), to try to get sensitive information from you.

How about vishing? Or smishing? Or even whaling?

These are all forms of phishing designed to steal your information, and ultimately your money.

We explore each one in our brand new video.

The more aware you and your staff are; the better protected you’ll be.