-
Cyber Security Policy
In today’s digital landscape, the significance of implementing a robust cyber security policy cannot be overstated, particularly for companies operating within the UK. Such a policy serves as the cornerstone of an organisation’s defence against the ever-evolving threats posed by cybercriminals. A comprehensive cyber security policy should encompass a clear outline of employee responsibilities, data…
-
So you don’t think cyber security is for you?
Don’t bury your head in the sand! If you have anti-virus, a firewall on your router, and keep your passwords secret, you probably think you have cyber security covered, but I have bad news for you – you haven’t. Cyber Security as an Investment If you have bought anti-virus software you have invested in cyber…
-
Spring Cleaning
Spring cleaning is not only for your home, but also for your computer. A cluttered and dusty computer can affect its performance, security and lifespan. Here are some tips on how to clean up your computer and make it run faster and smoother. Delete unnecessary files and programs. Over time, your computer accumulates a lot…
-
Why has my email font changed?
Why has my email font changed? Well the other day I was out onsite and questioned about the new font when sending email. Initially they thought they had a caught a bug. We soon found out that this was in fact a changed made by Microsoft. Microsoft has recently announced that it will change the…
-
The importance of a reboot!
The other day we were asked to diagnose a fault with an application that wasn’t coming up with the correct text and boxes on it. In this instance it was a VoIP app on a PC. One of our engineers had suggested the importance of a reboot and it turned out that it wasn’t done…
-
What is Multi-Factor Authentication?
Multi-Factor Authentication (MFA), also known as Two-Factor Authentication (2FA), is a method of authorising a login using multiple pieces of authentication. The pieces are usually defined as something the user has and something the user knows. For example, withdrawing money from a cash machine requires your valid credit or debit card (what you have) and…
-
Defence in Depth Part 4 Overview
If you have been following our posts on Defence in Depth you will be gaining an understanding of some of the products and services we can provide. This article is about the layers that need to be addressed in order to meet your Cyber Security goals. At the bottom of the article there are links…
-
More about your VPN
This is a follow-on article to my previous article Let’s Talk About Your VPN. You should read that article first, to save me having to explain what a VPN is and why I am talking about them now. VPN Issues I spent last week talking up the cyber security advantages of your VPN, but all…
-
Defence in Depth Part 3
Welcome back once again for part 3 of Defence in Depth. The final layer of protection is the full endpoint (Local PC) backup. You can have all the protection in the world for your cloud environment however lots of important business critical data can and often is stored locally, however what happens when your computer…
-
Let’s Talk About Your VPN
I am on holiday for the next two weeks – some cold weather walking in the Lake District and the Cairngorms, whilst Diana stays back in the warm office – so it must be time to discuss VPN usage again. The photo above is the view whilst I write this article. A VPN – your…
-
Defence in Depth Part 2
Welcome back! If you haven’t read part 1 about “Defence in Depth” please check it out, otherwise let’s look at the next stage of defence in the cyber security theatre of war. Remote Monitoring and Management (RMM) RMM is a toolbox of programs, a swiss army package, taking care of lots of tasks which historically…
-
Defence in Depth Part 1
“Defence in depth is a strategy that leverages multiple security measures to protect an organisation’s assets. The thinking is that if one line of defence is compromised, additional layers exist as a backup to ensure that threats are stopped along the way” SaaS Defence in Depth Microsoft 365 is used by millions and is an…