fbpx

Our News, Tips and Advice

  • You Can Teach an Old Dog New Tricks!

    You can teach an old dog new tricks

    It is fully fifty years since I used my first computer.  It was a terminal to a mainframe, and that is the kind of computing I was to access until the day I had a PC plonked on my desk when I was working for Ford of Europe.  I have used PCs and laptops ever…

  • Risky business

    You can’t create a security strategy without considering RISK.  Your business most likely takes in a lot of information from a lot of different places, even if it isn’t that digitally involved. If you have employees and if you bill customers (a safe assumption!) you will keep some details about them. Every point of data entry and storage is a risk point.  You can start to mitigate that risk by classifying…

  • Plan B

    Another day, another dollar and so it’s business as usual, or maybe not. Many companies are facing business continuity issues due to the current health related problems. Although the pandemic has been a serious issue to overcome, it is by no means the only threat to business. Business continuity management is about ensuring a swift…

  • Let’s Get This Straight

    If you own and use a computing device, either for work or in your personal life, then it is vulnerable to malicious misuse by unknown third parties. Please note I used the term, “computing device”. This will obviously include a computer running Microsoft Windows, probably one of the most targeted platforms by attackers. And why…

  • Data: How Much Do You Have?

    How Much Data Do You Have

    Today data storage is cheap. When I bought my first laptop in 1991, I splashed out and bought the 40 megabyte hard drive model (Computing History, 2021) – for a similar price to the 500 gigabyte SSD Laptop I bought last summer (Dell, 2020). Sitting here writing this blog on my iPhone, when I come…

  • Passwords are only the first step

    Today the threat to our digital security is high – with the pandemic causing a rush to online services the hackers know there are many prime targets out there putting their credit card details and other PII into computer systems (ICO, 2021) so it is worth their effort to see who is not taking steps…

  • Latest Windows 10 update is here…

    …and you must update.  Not because it is offering some shiny new widgets – the best you can find for that is a news and interests widget for the Taskbar and configuration options for multiple cameras when used in conjunction with Windows Hello face recognition security (actually thinking about it, I have multiple cameras on my office laptop…

  • Security, Compliance and “AAA” in Action

    Security and Compliance

    AAA = Authentication, Authorisation and Accountability AAA is a vital step in any cyber security strategy is: AAA, the first two As gives you the ability to control who has access to your information and what information they are able to see. The third A is accountability – without this the first two As are…

  • Share or Not to Share?

    sharing

    One of the great strengths of Microsoft 365 for Business is that collaboration was central when it was being developed. There is a prominent “Share” button in Word, Excel and PowerPoint to enable collaboration.  Fig 1 – The Share button in Word  I will be using Word as an example but the skills are transferable…

  • Is your Website Ready for the Google Core Web Vitals Update?

    Google Core Web Vitals

    Google announced some time ago that they will be introducing a new set of criteria for SERP (Search Engine Results Page), those listings of mainly organic results that everyone wants to be at the top of. And the name for this new set of criteria is Core Web Vitals, due to be introduced in May…

  • Cyber Security and the Importance of Sharing

    Cyber Security Sharing

    Information processing is an action that is happening at all times, even now whilst I write and you read this material. The average person receives an impressive amount of information each day. Sometimes new information creates more questions and a need for further research. Sometimes obtaining new information generates an instant need for sharing it…

  • Firmware Attacks

    Firmware

    Do you need to worry about this? Should firms be more worried about firmware cyber-attacks? – BBC News Most malware works at a “surface level” which is why, in most cases, the user must be tricked into allowing the malicious program to run. For example, clicking a link in an email or opening an attachment.…