fbpx

Category EasylifeIT TechTalks

How secure is my office Wi-Fi?

How secure is my office Wi-Fi?

How secure is my office Wi-Fi?

A vulnerable route straight into the system.

Earlier this year I sat in a restaurant (remember doing that?) awaiting the arrival of a customer, ready to discuss the final details of a project. Habitually, I was very early; having allowed for traffic, natural disasters, et al, none of which occurred and I therefore had plenty of time to catch up on emails. I asked the restaurant manager if Wi-Fi was available and without hesitation, and a proud little flourish, I was presented a code on the back of a card designed just for the purpose. All very efficient and organised I thought.

Read More

If you found this article useful, then please share for others

How can I educate my team on cyber security?

How can I educate my team on cyber security?

How can I educate my team on cyber security?

“Why did I get infected? I have an antivirus” is quite a common question and a good one. Whoever named the most common method of infection “Trojan Horse” certainly knew their history; and for the few who haven’t heard the story or watched the movie; a seemingly impregnable and well defended city was broken by exploiting the trust, ignorance and superstition of otherwise sophisticated people.

Read More

If you found this article useful, then please share for others

What constitutes a good password and why it is important to have one?

What constitutes a good password and why it is important to have one?

What constitutes a good password and why it is important to have one?

Quite simply; your password is the key to your IT castle. The walls you carefully build around your business data are of little value if the front door lock is easily picked. The idea that passwords should be long and complex is one of IT industry’s sacred cows, and yet many users stubbornly stick to passwords such as 12345, Password1 or Jimmy1970; which often takes less time to crack than to type them. The question “So, what constitutes a good password?” is a common one. Read More

If you found this article useful, then please share for others

Why are top managers often the targets of cyber criminals?

Why are top managers often the targets of cyber criminals?

Why are top managers often the targets of cyber criminals?

As top managers of SMEs, we expect and demand access to all data within our company. While we may consider restrictions upon our staff reasonable and sensible, these surely don’t apply to us? Of course, we need them; finance, operations, sales and marketing are the very pillars of our company, and we need access to every document and every record in every area.

Read More

If you found this article useful, then please share for others

Vivacious EasylifeIT™ TechTalk at Peterborough Museum

Vivacious EasylifeIT™ TechTalk at Peterborough Museum

What did the Romans do for us?; a thought provoking backdrop for the latest EasylifeIT™ TechTalk.

Peterborough Museum was an excellent and inspiring choice of venue for our latest informal discussion around Trojan horses and other such threats to your business IT infrastructure.

Presented by Lindsey Hall, Managing Director of EasylifeIT™; Cybersecurity for Small Business was the talking point; with a short briefing and an open discussion about what can be done to protect their business and the best way to do so from such threats varying from viruses to malware. The relaxed format allowed those who attended to take away some relevant tips and advice to practically introduce into their businesses.

Lindsey commented; “The key message we want people to take away is that just having an antivirus is not enough! There is no technological silver bullet and no amount of security product which will compensate for carelessness or lack of staff training. Education is absolutely key”

She continued; “We would very much like to thank Peterborough Museum who as well as providing excellent facilities also kindly arranged a private tour afterwards of what is an often overlooked gem in our city^.

Attendees today were unanimous in their appreciation of the unique and relaxed format of the TechTalk series and the advice and information they could take away. Comments included:

“A really good event; perfect timing and very informative” – Hazel Cottrell

“Lindsey Hall @easylifeIT @YourTechTalks, giving a very interesting & informative #TechTalks earlier @Vivacity_Museum” – Ashley Briggs (Twitter)

“Thoroughly enjoyed it, albeit a scary subject (buts that reality)” Judith Goode

“It was an eye opener for me having been a Mac user for over 15 years to learn viruses are increasingly being targeted at all popular hardware, not just the PC” Steve Pretsell

 

EasylifeIT TechTalks are a series of short briefings and Q&A sessions hosted by local orgaansiations with an interesting story to tell.

The next scheduled TechTalk is in June 2015 – Venue to be announced

EasylifeIT TechTalks

If you found this article useful, then please share for others

1 2