fbpx

Category Cyber security and resilience

Do I need to backup Office 365 data? 

Do I need to backup Office 365 data? 

Do I need to backup Office 365 data?

My Inbox has been swamped of late with vendors trying to sell me additional backup facility for Office 365, and a question I am increasingly asked by customers is .. “do we need to back up our Office 365 data?” A good question! It is a common assumption that Microsoft has this coveredand to be honest for most situations, they have. With what I know of Office 365 capabilities and being a critical part of our own setup, I have chosen not to have additional backup. That isn’t to say however that your own compliance or sense of self-preservation won’t lead you to a different decision.  I believe some vendors claims to be hyperbolic as to why you should use their backup .. some claims have some truth .. some stretch it somewhat.  

So .. here are the facts.  Read More

If you found this article useful, then please share for others

How secure is my office Wi-Fi?

How secure is my office Wi-Fi?

How secure is my office Wi-Fi?

A vulnerable route straight into the system.

Earlier this year I sat in a restaurant (remember doing that?) awaiting the arrival of a customer, ready to discuss the final details of a project. Habitually, I was very early; having allowed for traffic, natural disasters, et al, none of which occurred and I therefore had plenty of time to catch up on emails. I asked the restaurant manager if Wi-Fi was available and without hesitation, and a proud little flourish, I was presented a code on the back of a card designed just for the purpose. All very efficient and organised I thought.

Read More

If you found this article useful, then please share for others

How do I assess how secure our IT system is?

How do I assess how secure our IT system is?

How do I assess how secure our IT system is?

Common sense isn’t difficult or expensive

There’s often a big difference between perception and reality.  Cyber security is a classic example.  The perception is that it is a form of high tech, complicated warfare.  Acronyms; impenetrable terminology; high profile media stories of boffins fighting to repel the sinister attacks from rogue foreign states.  It’s no wonder we feel this is beyond us mere mortals to understand, let alone do anything about it.

However, the reality is that a lot of cyber crime is relatively low tech and unsophisticated.  Much of it doesn’t even rely on technology; many attacks centre around social engineering.  Cyber criminals have long understood that it’s easier to trick a human being than it is to trick a computer.  Why waste time trying to hack a computer when you can hack a person and get them to click on a dodgy link? Read More

If you found this article useful, then please share for others

Why is two factor authentication important?

Why is two factor authentication important?

Two factor authentication (MFA) – little pain, big gain

The rise and rise of the cloud

The use of cloud computing continues to grow rapidly. Packages such as Microsoft Office 365 and Google G Suite are very widely used across businesses of all sizes for a multitude of purposes, including e-mail, file storage and file sharing.

Legislative requirements are also driving wider adoption of functionally specific software, including cloud accounting to meet HMRC’s ‘Making Tax Digital’ requirements. Many businesses will be familiar with well known packages such as Xero and QuickBooks Online.

Popular, but also a target

Read More

If you found this article useful, then please share for others

1 2 3