Results for keyword: protection

 For SME owners, cyber-security is usually right at the top of your support shopping list. Never has this been more apparent than in recent months – where reports of data breaches and ransomware attacks have hit the UK headlines.

In August, the government issued a warning after people had received emails purporting to originate within the Ministry of Defence, attempting to make contact or seeking money. It’s exactly this kind of social engineering which cyber-criminals are employing, in order to hook their victims.

By playing to the public’s trust of those in senior positions, SME’s need to be savvy to a new breed of attacker – those which are relying on the ‘Colonel Effect’.

Published in Blog

Monday 26 November is the 332nd day of the year, meaning there are just four weeks to go until Christmas. But, even more newsworthy than that, is that it’s also Cyber Monday 2018.

The floodgates will now officially be open for 24 hours of bargain hunting at all major retailers, but if you’re looking to capitalise on these flash sales too – as a buyer or a retailer – it’s important to keep an eye out for the digital criminals lurking in the shadows. Here’s why they love Cyber Monday just as much as the rest of us…

Published in Blog
Wednesday, 24 October 2018 08:00

Reach your IT peak: Essentials for scale-ups

Making the leap from start-up to scale-up can be demanding, but ensuring your IT support grows with you needn’t be a tough mountain to climb.

While the coffee machine probably isn’t the only thing starting to feel over-worked, all being well you’re really seeing the benefits of the hours of hard graft you put in during your business’s early stages.

Now the solid foundations are in place, it’s time for a little bit more structure to help you to reach your IT peak.

Published in Blog
Monday, 27 November 2017 07:30

5 things you need to know about encryption

In our everyday, digitally-enhanced lives, we rely heavily on encryption to protect our sensitive data. But although it’s an effective safeguarding measure for keeping things private, it can also mask a number of threats.

The very practice of encrypting information so that it cannot be read without a specific decoding key means that it presents a huge blind spot when it comes to threat detection.

Over half of all online content is protected to some extent using this method, so what do we really need to know about encryption as we approach 2018?

Published in Blog

It’s no secret that employees are the glue that hold businesses together. But – in the words of Spiderman’s Uncle Ben – with great power comes great responsibility, and your staff play an absolutely crucial part in upholding the cyber-security of your company.

There’s no getting away from the fact that employees can be culpable of leaving your SME open to being targeted by hackers – whether that’s through failing to adequately protect their remote devices, using public WiFi networks without VPN precautions or being duped by phishing emails, for example. But rather than seeing them as a weak link in your cyber-defences, it’s far more productive to focus your attention on how your workforce can become an extra layer of security rather than a vulnerability.

Published in Blog

North West IT support specialist Q2Q has secured two prestigious industry accreditations, recognising the level of expertise within the growing team.

Published in Blog

We’ve previously explored the benefits of prevention over cure with IT support, and the same definitely applies when it comes to cyber security for SMEs. Having effective protection in place to block potentially risky spam emails and harmful viruses is far safer and more cost effective than trying to solve the problem once an attack has taken place.

Published in Blog
Wednesday, 18 November 2015 10:21

What’s the Pa$$w0rd?

As much as this is a very simple topic, it is often overlooked by many people and the safety of our documents and accounts should be of the up-most importance- especially in a business. Here is a brief guide to the best password security. 

Published in Blog