News &

BLOGS

Stay up to date with our latest news and blog posts

Threats to Your Business

Cyber Security
Ransomware, Reyptson, Leakerlocker. These are all terms for some of the most common threats to your IT systems, and where those providing managed IT services provide priceless security. Before I…
Read More

Phishing Emails

Cyber Security
23% of people that receive phishing emails will open them What is Phishing? Phishing is the fraudulent practice of sending emails purporting to be from reputable companies in order to…
Read More

Encryption

Business IT Support
What is it and why does your business need it? Encryption is the process of encoding digital data so that only those authorised can access it. Encryption effectively “renders the…
Read More

Royal Mail Email Scam

Cyber Security
Does this look legit to you? Would you follow the link provided? The scam, also known as CEO Fraud or Executive Impersonation Fraud, as well as the Big Boss Scam.…
Read More

Cybercrime with Chris Neilson

Cyber Security
Cybercrime There are many different types of cybercrime, with new methods constantly being used. Some of the most popular cybercrime examples include phishing, malware attacks, The Big Boss Scam, as well as…
Read More

What is Cryptowall?

Cyber Security
What is Cryptowall? Trojan Cryptowall is a Trojan horse that encrypts files on the compromised computer. It then asks the user to pay to have the files decrypted. After they…
Read More

Social Media

Cyber Security
How much data do your social media profiles reveal? Social media is a big part of modern day personal and business life. Whether it’s staying in touch with friends or…
Read More

User Accounts

Business IT Support
Do you know who has access to what data? Setting up user accounts is something dedicated IT support companies will suggest. Having user accounts means you have control over who…
Read More

Safe Blogging

Cyber Security
Blogs Can Put You at Risk of Identity Theft Whether blogging for personal reasons or for your business, you need to understand the risks and prevent them to ensure safe…
Read More

Safe Apple Mac Use

Business IT Support
Is your business implementing safe Apple Mac use? Apple Mac devices are known for being less vulnerable to viruses and Malware, however, this does not mean that they are completely…
Read More

Physical Device Security

Business IT Support
How to Maintain Your Physical Device Security  Protecting your physical equipment from not only cybercrime, but theft, loss, accidental damage, fire and flood is also vital for the productivity, continuity…
Read More

Mobile Device Security and Apps

Cyber Security
Does your business provide company mobiles to employees?  Many businesses can benefit from the use of mobile devices as this enables easier communication between staff, customers and suppliers. But no…
Read More

Internet Calls Come with Risks

Cyber Security
Internet calls such as Skype and mobile phone video calls are all very convenient and inexpensive for modern businesses. VoIP phones are becoming the standard phone system across businesses. This…
Read More

Instant Messaging

Cyber Security
Not all instant messaging platforms use encryption. Who is reading your data? Instant messaging has replaced text messages. Especially with the capabilities of video calling and voice calling. However, there…
Read More

HMRC and Companies House Scams

Cyber Security
Spot the HMRC scams and Companies House phishing emails that could put your business at risk… HMRC scams and Companies House scams are usually distributed through phishing emails to business’…
Read More

Domain Name Scams

Cyber Security
Have you ever heard of Domain Name scams? Creating a website comes with many risks. By creating or commissioning a website, you will need to purchase a domain. By doing…
Read More

Cryptocurrency Investment Fraud

Cyber Security
Cryptocurrency becoming increasingly popular meaning more risks… Cryptocurrency is on the rise and so is are cybercrime scams relating to it. This is particularly important for businesses looking to invest…
Read More

Call Recording

Cyber Security
Did you know that your call could be recorded without you knowing? This is something we see on a regular basis providing small business IT support. You can pay a…
Read More

Safe Contactless Payment

Cyber Security
Is every contactless purchase a safe contactless payment? Contactless cards have been around for a while now, but are we using them safely? Contactless cards use a technology called Near Field…
Read More

The Office Supply Scam

Cyber Security
Ensure your staff know who is ordering what… Ordering supplies can come with its problems, with orders being wrong, things being missed or out of stock. However, it’s important you…
Read More

Online Shopping Fraud

Cyber Security
How often do you or your employees use online shopping? Online shopping has revolutionised the way that people shop these days, as it brings convenience, saves time and provides users…
Read More

Courier Scams

Cyber Security
Spot the signs of courier scams… Courier scams are mainly targeted towards individuals rather than businesses, however, it is still important to familiarise yourself with the scam, especially if you…
Read More

Invoice Scams

Cyber Security
Can your accounts staff spot malicious invoice scams? Working in business accounts can be a risky place with the amount of cybercrime surrounding invoices, accounts and payments. Your accounts staff…
Read More

Copycat Websites

Cyber Security
Learn how to spot copycat websites Could you identify copycat websites? These websites are fake replicas of real government department or agency sites, with everything from the branding and logos…
Read More

Use of Cookies

Cyber Security
Our websites use cookies to distinguish you from other users of our website. This helps us to provide you with a good experience when you browse our website and also…
Read More

Safe Internet Use

Cyber Security
Avoid malicious sites and optimise your security features Could you spot a fake website? Do you implement safe internet use in your business? Secure Websites When visiting websites, ensure there…
Read More

WiFi Hotspot Security

Cyber Security
Do you regularly work on the go and rely on WiFi hotspots? The secure use of WiFi hotspots is important for both business and personal safety. If you are working…
Read More
Menu