The BIG mistake companies make with their IT Security

If you’re like many businesses today, there’s a good chance you’ve made this one mistake with your IT security: you don’t budget for it. Or if you do budget for it, it’s not enough to really protect your business. Time and time again, business owners decide NOT to invest in IT services. Instead, they go it alone…

Mutifactor Authentication

We understand how important IT security is. At work all our computers are up to date with operating systems and patches. If a stage 4 lockdown occurs, it means my staff have to work from home. Staff are now using their home computers to login and access our systems. I know this comes with risk.…

Last line of defence

We set up our backup years ago. We’re covered. I hear this sort of thing from so many businesses. Unfortunately, backup isn’t the type of thing you can just set and forget about. If your company finds itself compromised by a serious event like cyber-attack or an employee makes an innocent mistake, often your backup…

Virus Attacks

We have a Firewall and antivirus so we are safe. We’re covered.  I often hear this response. And to be fair, this is a good start. In fact, we had a similar line of thinking before we were brought in to diagnose what had happened to a company who was hit by a serious virus…

Firewalls – is yours up to scratch?

We’re protected. We set up a firewall a few years ago. I hear this sort of thing from so many businesses. Unfortunately, cybersecurity isn’t the type of thing you can just set up and forget about. On top of that not all Firewalls are equal. Viruses, malware, and hackers are constantly evolving which means your…

You’ve just experienced a cyberattack. What do you do?

When I speak with small businesses about cyberattacks, it’s surprising how most of them don’t have a plan if they get hit. Where do you store your data backups? How will you continue to operate if you lose your data? These are the types of questions you need to ask yourself in order to properly…

Hackers – how and why?

HOW do hackers steal your data? WHY do they do it? Nearly every business I talk to is worried about cyberattacks. Two of the most common questions I hear are “How do hackers attack?” and “What’s their motivation?” When it comes to hackers, there are three common strategies used: Social engineering. Brute force. Phishing emails.…

The risk around emails

We have our email in 365 so we are safe. We’re covered. I often hear this response. Unfortunately, just because your email sits in Microsoft cloud (or anyone ones cloud) does not automatically mean all is OK. Majority of the time the vendor is responsible for the uptime and availability of their service however it’s…