Spam, spam, spam, spam, spam, spam, spam, spam...
Today, we had the most wonderful bit of comment spam on our blog post ‘Is Someone Spying On Your Mobile Phone Calls?’. And when we say ‘wonderful’, we mean poorly written, completely unwelcome and destined for removal.Read More »
All change for the government's security certification programme.
Earlier this year, the NCSC (National Cyber Security Centre) announced that changes were coming to the Cyber Essentials scheme, one of which would be to reduce the number of accreditation bodies, from five down to one. The result of the competition has now been revealed, with the IASME Consortium set to take charge of Cyber Essentials from 1st April 2020.Read More »
If criminals can create their own reality, how can they be stopped?
Deepfakes, realistic counterfeit videos created by artificial intelligence, are being posted online in ever greater numbers, says a new report. In the last year, there has been a 100% increase in deepfakes on the web, and while the vast majority (96%) of them are pornographic in nature, this technology also poses a major security risk for businesses – because as deepfakes improve, their effectiveness as a means to commit fraud also gets better.Read More »
Some of the best things in life really are free.
Cyber security, like any form of security, often involves spending money. If, for example, you want CCTV, locks on your doors and a burglar alarm for your business premises, then you’ll have to pay for them. You can expect the same if you want anti-virus, a firewall and a backup system for your IT.
But there are some cyber security measures that cost nothing at all. These are simple actions that can make a real difference to your safety, without affecting your budget. Can they replace cyber security technology? No, but they can complement it and give your organisation an extra layer or protection.Read More »
Protect your precious data with backup and disaster recovery
In the case of most major cyber security attacks, recovery of data is the number one priority. Software can be reinstalled and hardware can be repaired or replaced, but data is often unique or extremely difficult to gather again.
This is why ransomware is such a frightening form of malware. In the short term, affected businesses will likely lose time and money due to downtime, as they scramble to get things up and running again, but it wouldn’t take long to wipe all your systems and start again.Read More »
Chances are you're still using one of these.
Most of the time, when a new technology comes out, it replaces whatever preceded it in a reasonable amount of time. CDs, for example, superseded floppy disks as a storage medium. And while there was a period in which people continued to find uses for those old floppies, the crossover wasn't overly long. CDs became the norm, then DVDs, then flash drives and then the cloud.
But some technologies just refuse to go away completely. Despite newer, better alernatives, they cling on for years. Here are just six of these hardy survivors.Read More »
If you’ve ever forgotten the jumble of letters, numbers, and the maiden name of your best friend’s neighbour’s mother at nursery school, you’re not alone. Getting locked out of an important application is a daily headache for millions. Here’s a pain-free guide to getting back into your Office 365 account.Read More »
There’s nothing worse than getting half-way through your Month/Year End, only to discover that you have forgotten to include your sales transfers. In today’s hectic world, it is a surprisingly easy mishap. As long as you have backed up your files, restoring data in Pegasus Opera 3 is easy. Here’s our quick guide to fuss-free data restoration.Read More »
Whether it is time for a payroll update, a cashbook transfer, or sales and purchase transfers, there are times when you need to feel confident that you have a good data backup. If you accidentally make an error in your processing, or you simply need to press rewind, it is important to know that your earlier data is safe.Read More »