Results for keyword: employees

Our MD Andrew recently shared some essential advice with BQ Live on how to safeguard your SME against a data breach. If you missed the article, you can read it in full below…

Published in Blog

Tackling cyber-crime and deterring malicious attacks is inevitably an ongoing battle, and there are a whole host of ways you can protect your SME from the ever-evolving threats out there.

Having strong passwords, encryption and anti-malware software in place are just some of the simple steps you can take to safeguard your systems – not to mention backing up your files to ensure your data won’t be lost if you do suffer a breach.

But the real secret to effective cyber-security? Your people!

Check out our short animation to find out why… 

 

Are you stuck with how to safeguard your SME’s systems? We’re experts in cyber-security and can work with your IT team or act as an outsourced one to ensure you’re well-protected. Get in touch to find out more!

Published in Videos

We’ve said it before in this blog and we’ll no doubt say it again – employees who are not trained and briefed properly on how to safeguard systems and data are the weakest link when it comes to cyber-security.

You can install high-grade IT measures to ward off attacks and repel the most sophisticated of malware, but if your staff don’t know their responsibilities, you are very vulnerable to a data leak.

Published in Blog

All businesses have policies on matters from maternity leave to grievance procedures, which are shown to new staff members on arrival. Once a recruit has been briefed on the really important things – such as where the teabags are kept and how it’s decided what station the office radio is tuned to – there will also be a bundle of paperwork to read and sign.

When it comes to IT, social media policies are probably the most prevalent – these advise employees on proper usage and whether or not it’s okay to post in working hours. But someone potentially being rude about you online, or scrolling through Twitter on your time, is only a small part of the risk when it comes to staff and tech.

Published in Blog
Monday, 26 March 2018 08:00

Is your printer a GDPR danger zone?

For many SMEs, dealing with sensitive information is just another part of everyday operations. Whether you work within retail, healthcare, security, professional services, law or finance – or pretty much any industry, to be honest! – the chances are you’ll handle some form of personal data in your day-to-day work activities.

You may have heard of a little thing called the General Data Protection Regulation (GDPR), which is a new legislation devised to uphold the rights of individuals when it comes to how this information is obtained, stored and processed. Set to come into effect on 25 May this year, businesses across the EU – and the rest of the world – are now scrabbling around trying to prepare themselves for the changes as we speak.

Published in GDPR

You’ve bought your factor 30 and some new sun shades… but have you thought about the security of your devices when you leave the UK?

Whether you’re travelling on business or for fun, the chances are you’ll be taking a whole load of data along for the ride via your phone, tablet or laptop. And, of course, it’s not just that bottle of shampoo in your washbag that could leak.

Published in Blog

When the GDPR comes into effect on 25 May, anyone dealing with personal data within an organisation will have to adhere to certain rules to ensure the information is adequately safeguarded. We recently shared some expert guidance with the Manchester Business Post on the different levels of responsibility that exist when it comes to data processing – if you missed the online article or magazine, you can read our advice in full below…

Published in GDPR
Monday, 08 January 2018 08:00

What are the dangers of ‘ghost’ users?

Are you afraid of ghosts? Maybe you should be – and here’s why…

We’re not talking about the kind that groan and clank and go bump in the night – rather the ones that can haunt the forgotten corners of your business systems, sometimes with catastrophic results.

Published in Blog
Wednesday, 27 December 2017 08:00

8 BYOD rules that every SME should follow

The initialism BYO might more commonly be seen with another B – and associated with casual social gatherings – but with a D at the end, it’s increasingly becoming a workplace term that relates to mobile devices.

More and more SMEs are inviting staff to use their own laptops, phones and tablets to conduct business, with the rapid growth of remote and flexible working accelerating this. A BYOD approach can work well for everyone involved – but there are potential problems too, so you need to know what they are in order to guard against them.

Published in Blog

It’s no secret that employees are the glue that hold businesses together. But – in the words of Spiderman’s Uncle Ben – with great power comes great responsibility, and your staff play an absolutely crucial part in upholding the cyber-security of your company.

There’s no getting away from the fact that employees can be culpable of leaving your SME open to being targeted by hackers – whether that’s through failing to adequately protect their remote devices, using public WiFi networks without VPN precautions or being duped by phishing emails, for example. But rather than seeing them as a weak link in your cyber-defences, it’s far more productive to focus your attention on how your workforce can become an extra layer of security rather than a vulnerability.

Published in Blog
Page 1 of 2