The password ‘123456’ has been found 23 million times in the National Cyber Security Centre (NCSC) Have I Been Pwned password campaign in collaboration with Troy Hunt. The NCSC campaign displays 100,000 most commonly re-used passwords that have been accessed by third parties in global cyber breaches. If you see a password in this Global password risk list…
If your business uses Microsoft 365 then you may be familiar with the suite of products that are on offer when you use this subscription based service. Popular with businesses as a way to keep data and communications in the cloud and enabling teams to work remotely with ease, Microsoft 365 includes everything you would…
Patch management describes the process of applying updates and fixes, known as ‘patches’, to software to fix any bugs and protect against newly found vulnerabilities. Any software can be exploited by cyber attackers as if they discover the vulnerabilities before all users have had a chance to apply the latest patches, they can exploit this…
Last year we spoke a lot about how to protect your business IT systems, as growth in home working due to the Covid-19 pandemic had caused an increase in cyber attacks. Now, as 2021 starts to take shape, it is clear that the pandemic is going nowhere, and thus the risks to your business data…
2020 has certainly been a tumultuous year for businesses. With the Covid-19 pandemic forcing many companies to adapt the way they work and home working becoming normal in many industries, it has certainly been a year that has changed the way we need and use IT. Going forward in 2021, and what we hope will…
Do you have the right systems in place to prevent an IT disaster over Christmas? With many businesses closing over the festive period and staff taking time off, it’s easy for IT systems to get forgotten about. The last thing anyone needs though, is a problem come January, when it’s back to business. This year…
Cloud Computing grows as more businesses work from home. The Covid-19 pandemic has brought about a major shift in the way we do business. Throughout the UK, as well as globally, there has been an increased uptake in online services as businesses move into the cloud. Like it or not, cloud computing is the future, and…
2020 has catapulted even the most technology-resistant businesses into the digital age. The Covid-19 pandemic, and subsequent lockdowns, forced most office-based businesses into a new home-working era. With this has come an increase in cyber security threats, and in particular, phishing emails. With every new development, whether positive – such as an advance in technology,…
What is Two Factor Authentication? Remember when logging into something was as easy as pasting in your username and password? So do we, but let’s not be fooled into thinking those were the good old days. Accessing any account that contains any personal or business data, needs to be protected by more than just a…
What Is Disaster Recovery Planning? Have you ever thought about what you would do if disaster struck your business? A flood, fire, break-in or human error could cause irreparable damage to your premises, but what about your business data? Not having a back up plan might mean your business cannot carry on, which is why…