The Scottish Government has made funding available for a new voucher scheme to help Scottish businesses and charities achieve the National Cyber Security Centre’s (NCSC) Cyber Essentials certification. The Cyber Essentials Voucher Scheme was launched on Wednesday 7th November 2018 … Continued
Verizon’s 2017 Data Breach Investigations Report found that 81% of of hacking-related breaches leveraged either stolen and/or weak passwords. This alarming statistic demonstrates that traditional password practices are the weak link in the security chain for many businesses.
In this article, we explore two-factor, or multi-factor, authentication as a much more secure, and human-friendly solution.
On September 28th, the FBI and the US Department of Homeland Security issued a joint statement about the increasing risks of Remote Desktop Protocol (RDP) attacks. According to the two US agencies, the use of RDP as an attack vector or way into your systems has been steadily on the increase.
The risks are real – and businesses would be well advised to take the necessary precautions. Grant McGregor answers a few key questions, so you can find out everything you need to know about RDP attacks.
We often get asked by our customers what sort of PC or laptop hardware to buy. Or what specification is right. Whether you’re very tech-savvy and know your PC components inside out, or you haven’t the foggiest what type of processor or hard-drive is best, it can be hard to decipher the technical jargon and sales tactics from the information you can actually use.
When it comes to making informed choices about your computer hardware, here’s some essentials that are useful to know…
GDPR has focused business leaders’ thoughts on the data held within their organisations and how best to protect it. Since the first step towards securing anything is understanding what you have, an Information Asset Register can help.
Grant McGregor explains what an Information Asset Register is – and why your organisation needs one.
We discussed in a recent article that there are many reasons to undertake the UK Government’s Cyber Essentials certification. Yet we have noticed some resistance within a few organisations when it comes to pursuing the certification, thinking “it’s too basic for us” or “we’re already doing all the essentials”.
However, we know that just because you have implemented good security processes, this doesn’t mean your organisation can’t benefit from following the certification process.
Everyone begins their Cyber Essentials certification process from a different starting point – but that’s what makes the scheme so important…
Despite consumers calling out planned obsolescence in the technology industry, companies are still graduating towards the subscription model for the simple fact that it works. When it comes to tech, it pays to charge monthly if the product is of good quality.
And perhaps with retaining customers in mind, Microsoft recently announced that it was launching the new Office 365 for Business, Home and Students, now available on a rolling monthly subscription.
The disaster recovery and business continuity expectations of senior business leaders are changing – how can IT managers respond to ensure the success of their disaster recovery and business continuity plans?
This blog outlines key ways to look at how to respond to this challenge and ensure the success of your disaster recovery and business continuity plans.