Results for keyword: data protection

 For SME owners, cyber-security is usually right at the top of your support shopping list. Never has this been more apparent than in recent months – where reports of data breaches and ransomware attacks have hit the UK headlines.

In August, the government issued a warning after people had received emails purporting to originate within the Ministry of Defence, attempting to make contact or seeking money. It’s exactly this kind of social engineering which cyber-criminals are employing, in order to hook their victims.

By playing to the public’s trust of those in senior positions, SME’s need to be savvy to a new breed of attacker – those which are relying on the ‘Colonel Effect’.

Published in Blog

2018 was a year of technical focus for the Q2Q family. The growth of the team and the hard work put in behind the screens means customers will continue to see subtle improvements throughout the next 12 months.

But, as technology advances at a rapid rate, so does the toolkit of the cyber underworld. And while we need to ensure systems are in place to combat online criminals, its important they don't come at the cost of usability.

Operations director of Q2Q, Lorna Stellakis explains why the latest addition to the team has had a significant impact on their customer experience, and why – in 2019 – solid IT infrastructure should be at the top of any SMEs shopping list.

Published in Blog
Wednesday, 24 October 2018 08:00

Reach your IT peak: Essentials for scale-ups

Making the leap from start-up to scale-up can be demanding, but ensuring your IT support grows with you needn’t be a tough mountain to climb.

While the coffee machine probably isn’t the only thing starting to feel over-worked, all being well you’re really seeing the benefits of the hours of hard graft you put in during your business’s early stages.

Now the solid foundations are in place, it’s time for a little bit more structure to help you to reach your IT peak.

Published in Blog

Cyber-crime is an issue that undoubtedly spans the globe and with an ever-accelerating rate of technological evolution, it’s no wonder that incidents are becoming more commonplace – not to mention increasingly sophisticated! But is it really an issue that all organisations need to be concerned about?

The no-frills answer to that question is yes. Cyber-criminals don’t discriminate between business types or industries – and they certainly don’t let size put them off either. Whether a multinational corporation or a regional start-up, cyber-attackers show no mercy.

It’s in this respect that SMEs shouldn’t be lulled into a false sense of security and think that cyber-criminals won’t target their business – threats are around every corner of the digital minefield, and attackers are sure to strike if a firm’s guard is down.

Published in Blog

In the lead up to the introduction of GDPR – and in the weeks since – we’ve shared plenty of advice surrounding email marketing and how to ensure your mailshots are compliant with the new regulation. We’ve even put together a short animation covering the basics – perfect for anyone with a short attention span!

But one area that still seems to be baffling people is the process of opting in/out – and more specifically, how to ensure you’re making this procedure clear and simple for those you’re emailing.

Published in GDPR

We’ve said it before in this blog and we’ll no doubt say it again – employees who are not trained and briefed properly on how to safeguard systems and data are the weakest link when it comes to cyber-security.

You can install high-grade IT measures to ward off attacks and repel the most sophisticated of malware, but if your staff don’t know their responsibilities, you are very vulnerable to a data leak.

Published in Blog

Our MD Andrew recently shared some important guidance on SME data security with Lancashire Business View. Didn’t catch the article? Don’t worry – you can read it in full below…

Published in Blog

Have you heard of the 3-2-1 rule when it comes to safeguarding your business data? It’s a good, industry-standard principle that applies to most situations in the field of IT back-up – an area where typically, one size almost never fits all.

A 3-2-1 methodology ensures no single point of failure – there are three copies of the data, on two separate media types with one stored off-site.

Published in Blog
Monday, 28 May 2018 08:00

Heeeeeeeere’s GDPR!

Well, it’s finally arrived… 25 May has been and gone, and the dreaded new data protection legislation is finally in full force.

So, what should you be doing now?

It’s important to remember that GDPR compliance isn’t just one little box you need to tick – it’s an ongoing journey. Even if you’ve spent the past year preparing, your hard work isn’t over yet. You still need to stay on top of your data processes to ensure nothing falls through the gaps.

To help keep you on the right track where sensitive data and security are concerned, we’ve put together a short animation covering five key steps to staying compliant…


Still need a bit of help with your GDPR compliance? Get in touch to find out more about our specialist services.

Published in Videos

When it comes to protecting your SME against lurking cyber-security threats, there are a number of obvious steps you’ll have probably taken already – for instance, setting strong passwords, encrypting sensitive files, installing anti-virus software and warning employees not to click links in dodgy-looking emails.

But it’s also likely that there are some key vulnerabilities that you’ve overlooked in your preparations. However hard you try, the truth is that there’s always more that can be done to safeguard your company against a cyber-attack. So, whilst it might seem like you’re fighting a losing battle, don’t be disheartened! Getting the small things right does make a difference and helps to bolster your defences.

Published in Blog
Page 1 of 4