Results for keyword: data protection

As a business owner, keeping your employees safe online sounds like it should be easy, but with the increasingly sophisticated hacking tactics of cyber-criminals, this sadly isn’t the truth – in most cases at least.

Despite the majority of threats originating from outside an organisation, all too often actual cyber-security incidents emerge due to the actions of someone much closer to the office – an employee.

There’s no hiding from the fact that 2018 was replete with cyber-attacks and data theft – with at least one breach appearing in the news each month, and it’s important to be aware that sadly, this trend is likely to continue in a similar vein throughout 2019.

In fact, it was only last week that one of the biggest data breaches in history was recorded – with 772 million email addresses and 22 million passwords having been leaked at once. So, how can SMEs ensure their staff – and systems – remain safe? Well, if you’re unsure, the following tips are a useful place to start…

Published in Blog

 For SME owners, cyber-security is usually right at the top of your support shopping list. Never has this been more apparent than in recent months – where reports of data breaches and ransomware attacks have hit the UK headlines.

In August, the government issued a warning after people had received emails purporting to originate within the Ministry of Defence, attempting to make contact or seeking money. It’s exactly this kind of social engineering which cyber-criminals are employing, in order to hook their victims.

By playing to the public’s trust of those in senior positions, SME’s need to be savvy to a new breed of attacker – those which are relying on the ‘Colonel Effect’.

Published in Blog

2018 was a year of technical focus for the Q2Q family. The growth of the team and the hard work put in behind the screens means customers will continue to see subtle improvements throughout the next 12 months.

But, as technology advances at a rapid rate, so does the toolkit of the cyber underworld. And while we need to ensure systems are in place to combat online criminals, its important they don't come at the cost of usability.

Operations director of Q2Q, Lorna Stellakis explains why the latest addition to the team has had a significant impact on their customer experience, and why – in 2019 – solid IT infrastructure should be at the top of any SMEs shopping list.

Published in Blog
Wednesday, 24 October 2018 08:00

Reach your IT peak: Essentials for scale-ups

Making the leap from start-up to scale-up can be demanding, but ensuring your IT support grows with you needn’t be a tough mountain to climb.

While the coffee machine probably isn’t the only thing starting to feel over-worked, all being well you’re really seeing the benefits of the hours of hard graft you put in during your business’s early stages.

Now the solid foundations are in place, it’s time for a little bit more structure to help you to reach your IT peak.

Published in Blog

Cyber-crime is an issue that undoubtedly spans the globe and with an ever-accelerating rate of technological evolution, it’s no wonder that incidents are becoming more commonplace – not to mention increasingly sophisticated! But is it really an issue that all organisations need to be concerned about?

The no-frills answer to that question is yes. Cyber-criminals don’t discriminate between business types or industries – and they certainly don’t let size put them off either. Whether a multinational corporation or a regional start-up, cyber-attackers show no mercy.

It’s in this respect that SMEs shouldn’t be lulled into a false sense of security and think that cyber-criminals won’t target their business – threats are around every corner of the digital minefield, and attackers are sure to strike if a firm’s guard is down.

Published in Blog

In the lead up to the introduction of GDPR – and in the weeks since – we’ve shared plenty of advice surrounding email marketing and how to ensure your mailshots are compliant with the new regulation. We’ve even put together a short animation covering the basics – perfect for anyone with a short attention span!

But one area that still seems to be baffling people is the process of opting in/out – and more specifically, how to ensure you’re making this procedure clear and simple for those you’re emailing.

Published in GDPR

We’ve said it before in this blog and we’ll no doubt say it again – employees who are not trained and briefed properly on how to safeguard systems and data are the weakest link when it comes to cyber-security.

You can install high-grade IT measures to ward off attacks and repel the most sophisticated of malware, but if your staff don’t know their responsibilities, you are very vulnerable to a data leak.

Published in Blog

Our MD Andrew recently shared some important guidance on SME data security with Lancashire Business View. Didn’t catch the article? Don’t worry – you can read it in full below…

Published in Blog

Have you heard of the 3-2-1 rule when it comes to safeguarding your business data? It’s a good, industry-standard principle that applies to most situations in the field of IT back-up – an area where typically, one size almost never fits all.

A 3-2-1 methodology ensures no single point of failure – there are three copies of the data, on two separate media types with one stored off-site.

Published in Blog
Monday, 28 May 2018 08:00

Heeeeeeeere’s GDPR!

Well, it’s finally arrived… 25 May has been and gone, and the dreaded new data protection legislation is finally in full force.

So, what should you be doing now?

It’s important to remember that GDPR compliance isn’t just one little box you need to tick – it’s an ongoing journey. Even if you’ve spent the past year preparing, your hard work isn’t over yet. You still need to stay on top of your data processes to ensure nothing falls through the gaps.

To help keep you on the right track where sensitive data and security are concerned, we’ve put together a short animation covering five key steps to staying compliant…

 

Still need a bit of help with your GDPR compliance? Get in touch to find out more about our specialist services.

Published in Videos
Page 1 of 4