Archive for author: Lindsey Hall

What is CEO fraud and what can we do to avoid it?
Cyber security and resilience Expert Articles Learning Centre

What is CEO Fraud and What Can We Do to Avoid It?

What is CEO fraud and what can we do to avoid it?

CEO fraud reputedly cost companies a whopping $1.1bn in 2018 and has been increasing steadily ever since. Impacting any size of company from micro to enterprise it is essential to understand how the scam works to protect your company and employees from it.

Firstly, what is it?

CEO fraud is when scammers impersonate a company executive making urgent and sometimes confidential requests of a member of staff within the company. Their motivation is usually financial, but we have seen rare instances where confidential data has been requested.

EasylifeIT™ Blog

EasylifeIT™ Partners with IT Governance for Compliance and Risk Management Services

It’s amazing how quickly things evolve. Just 10 years ago, the remit of an SME’s IT partner was covered by a fairly narrow set of requirements. The primary job centred around keeping the IT running and repairing things when it went wrong; IT security was just beginning to emerge as a distinct speciality. In those halcyon days, an antivirus and half-decent firewall was considered enough to tick the “due diligence” box for IT security. How times have changed.

EasylifeIT™ Blog

EasylifeIT™ Recertified Under the Cyber Essentials Scheme

As of August 2018, EasylifeIT™ is recertified under the Cyber Essentials scheme; which will assure you that we as a supplier practice the IT security that we preach.

Cyber Essentials (CE) is a government-backed cyber security certification scheme that sets out a baseline of cyber security suitable for all organisations. The scheme’s five security controls can prevent “around 80% of cyber-attacks”. Developed as part of the UK’s National Cyber Security Programme and in close consultation with industry, it provides businesses with clarity on good cyber-security practice.

EasylifeIT™ Data Protection Audit
Expert Articles GDPR Strategy and policy

EasylifeIT™ Data Protection Audit

Data Protection Audit

[lwptoc]

THE STORM HAS PASSED – RIGHT?

“GDPR – thank goodness that is over! I got fed up with e-mails asking for my consent and inviting me to read privacy notices.”
Relief seems to have been a common reaction to the arrival of the UK’s third generation of data protection laws. After months of media attention and a good deal of confusion, everything seemingly went quiet.

You could be forgiven for thinking the storm had passed. Time to start the clean-up operation and cleanse the inbox of all those GDPR related messages from May you never opened. It all blew over and nothing really happened. It was just like the Millennium Bug. Not quite…

EasylifeIT™ Blog

Lindsey Leads the Way for Women in Technology

Lindsey leads the way for women in technology

Friday night saw the inaugural Women Leaders Peterborough Awards; a night recognising the many talented and inspirational women leaders that Peterborough as a city boasts.

At the glamourous ceremony, hosted by the Peterborough Arena, 400 guests enjoyed a great night and celebrated the success of Peterborough’s inspirational Women Leaders, across many sectors with 15 winners.

Expert Articles GDPR Strategy and policy

GDPR – Separating Fact From Fiction

The new General Data Protection Regulation (GDPR) comes into force in May 2018. Awareness amongst businesses is increasing. However, whilst some companies are well on the way to updating their processes and procedures in preparation, the majority have either yet to start or are in the very early phases.

I’m confused – is this going to prevent ‘Business As Usual’?

A key concern of many businesses is confusion surrounding the implications. As the profile of GDPR has grown, so too has a perceived level of misinformation. It is something which the Information Commissioner’s Office (ICO), the government body which upholds data rights such as GDPR, recognises.

Expert Articles Strategy and policy

Using systems to help your business prosper

When we started EasylifeIT in 2006, my business partner insisted that we had strong systems in place from day one. More than a decade on and having seen the company flourish over that period, I appreciate more than ever how sound that advice was. It’s something I’m passionate about when I work with clients because I know from my own experience that it delivers results.

Despite having worked in the IT industry, but unlike many of my peers, I am a firm believer that not every problem requires an IT solution. However, when it comes to driving customer service and sales efforts, I am completely sold on the value of systems.

Expert Articles Strategy and policy

IT policies – A cure for insomnia?

IT policies – A cure for insomnia?

Let’s face it – IT policies are not the most exciting topic. Because of that reality, there are two common (but similarly futile) approaches:

  • Approach 1 – don’t bother.
  • Approach 2 – Find a generic IT policy on the internet. Put a copy in the staff handbook. Hope the staff will read it.

Does this sound familiar? Don’t worry – you are far from alone if so. However, it’s still worth taking a moment to think about trying to be better than average. The good news is that it isn’t difficult or costly to make a big step forward. And it’s worth doing to help protect your business, your customers and your staff from the threat of cyber crime.

Expert Articles Strategy and policy

Do I really need a new IT system?

They say the customer is always right. But, was anyone really doing the Emperor any favours when they remarked how wonderful his new clothes were?

If a customer approaches me and says “We need a new system,” my first questions are often “Are you sure? Can we talk this through?” This may surprise you as it might appear to be suggesting the customer is not always right. Although it could be interpreted as being unhelpful, there is method to my madness.

How can I educate my team on cyber security?
Cyber security and resilience EasylifeIT TechTalks Learning Centre

How can I educate my team on cyber security?

How can I educate my team on cyber security?

“Why did I get infected? I have an antivirus” is quite a common question and a good one. Whoever named the most common method of infection “Trojan Horse” certainly knew their history; and for the few who haven’t heard the story or watched the movie; a seemingly impregnable and well defended city was broken by exploiting the trust, ignorance and superstition of otherwise sophisticated people.