fbpx

Category Cyber security and resilience

How secure is my office Wi-Fi?

How secure is my office Wi-Fi?

How secure is my office Wi-Fi?

A vulnerable route straight into the system.

Earlier this year I sat in a restaurant (remember doing that?) awaiting the arrival of a customer, ready to discuss the final details of a project. Habitually, I was very early; having allowed for traffic, natural disasters, et al, none of which occurred and I therefore had plenty of time to catch up on emails. I asked the restaurant manager if Wi-Fi was available and without hesitation, and a proud little flourish, I was presented a code on the back of a card designed just for the purpose. All very efficient and organised I thought.

Read More

If you found this article useful, then please share for others

How do I assess how secure our IT system is?

How do I assess how secure our IT system is?

How do I assess how secure our IT system is?

Common sense isn’t difficult or expensive

There’s often a big difference between perception and reality.  Cyber security is a classic example.  The perception is that it is a form of high tech, complicated warfare.  Acronyms; impenetrable terminology; high profile media stories of boffins fighting to repel the sinister attacks from rogue foreign states.  It’s no wonder we feel this is beyond us mere mortals to understand, let alone do anything about it.

However, the reality is that a lot of cyber crime is relatively low tech and unsophisticated.  Much of it doesn’t even rely on technology; many attacks centre around social engineering.  Cyber criminals have long understood that it’s easier to trick a human being than it is to trick a computer.  Why waste time trying to hack a computer when you can hack a person and get them to click on a dodgy link? Read More

If you found this article useful, then please share for others

Why is two factor authentication important?

Why is two factor authentication important?

Two factor authentication (MFA) – little pain, big gain

The rise and rise of the cloud

The use of cloud computing continues to grow rapidly. Packages such as Microsoft Office 365 and Google G Suite are very widely used across businesses of all sizes for a multitude of purposes, including e-mail, file storage and file sharing.

Legislative requirements are also driving wider adoption of functionally specific software, including cloud accounting to meet HMRC’s ‘Making Tax Digital’ requirements. Many businesses will be familiar with well known packages such as Xero and QuickBooks Online.

Popular, but also a target

Read More

If you found this article useful, then please share for others

A Windows Update broke my computer. Should I turn updates off?

A Windows Update broke my computer. Should I turn updates off?

Regular Windows Updates are proven to be in your best interests.

NO! Please don’t do that. While it is true that Windows Updates can cause the occasional issue, the vast majority fix a multitude of sins and close security holes that have been identified as a threat to your PC or laptops security. On balance, leaving Windows Updates on and doing them regularly is hugely in your best interests.

Don’t forget Office updates. Microsoft Office is usually updated when you updated Windows and it is important for security that you do. Make sure that “Receive updates for other Microsoft Products when you update Windows” is enabled in Windows Updates Advanced Options. Read More

If you found this article useful, then please share for others

1 2 3