How Using A Default Password Can Put Your Business At Risk


If it says 'changeme', please take the hint.


The importance of strong passwords should be obvious, yet when it comes to IT hardware an alarming number of people never bother to set a password at all. Instead, they stick with the default password and happily go about using their equipment – completely oblivious to the danger of their inaction.

Read More »

Peripheral Vision: The Importance Of External Devices


Is your business using the right computing equipment?


When considering IT budgets and workstation setups, it’s perhaps understandable that computer peripherals might not stir up much passionate debate. If a brand new laptop, desktop PC or smartphone are blockbuster purchases, peripherals are all too easily viewed as the bargain basement purchase from the local supermarket.

Read More »

10 Cyber Security Commandments


Reduce your chances of being hacked, with this simple advice


According to the government's Cyber Security Breaches Survey 2018, more than 40% of businesses in the UK have experienced a cyber breach, and more than 70% say cyber security is a high priority for them. Yet less than a third of them have any kind of formal cyber security policies in place. Clearly more needs to be done, and to give you a head start, we've put together 10 cyber security commandments that every business should follow. There are, of course, many more tips and pointers we could include, but hopefully this will at least help you to get started.

Read More »

Using A Tablet For Business: Which Platform Is Best?


Mobile devices are light and easy to use, but can they really be used for serious work?


Using a tablet for business can seem attractive for a number of reasons. Like laptops, they enable remote working and hot desking, allowing workers to stay in touch with the office when they’re out and about. They’re much more portable and lightweight than laptops, though, and often cheaper too. In many ways, they’re easier to use as well, especially as they run the same operating systems that most people already have on their smartphones.

Read More »

How To Effectively Manage Your Screen Time

Over the past few years, newspapers have regularly run stories on the impact of too much screen time for children. It’s an issue that parents all over the country are all too familiar with, coming up with policies on how to manage how long their little darlings should spend in front on the television, tablet or any one of a growing paraphernalia of electronic devices.

Read More »

Are Cloud Backups Safe?


Online storage is handy, but it's not without risks.


The ability to store copies of important data online is something that many individuals and businesses find invaluable. Millions of users sign up to services like Dropbox, OneDrive and Google Drive, and there’s a huge market for enterprise-grade solutions like Veeam and Unitrends. It’s quick, convenient and cost effective. But are cloud backups safe?

Read More »

Many Business Have Poor Cyber Security, Says New Report


Are you doing enough to protect yourself?


Many businesses are failing when it comes to cyber security, including basic practices like updating software and using strong passwords. So says a new report by security firm Positive Technologies.

Read More »

Blogging For Business: How To Do It Right


A well-planned blog can be good for your business and your customers.


Blogging is just one of many marketing tactics available to SMEs looking to promote their business. Easy to get started and inexpensive, a business blog can prove a powerful tool within any online marketing strategy, provided it’s done correctly.

Read More »

Blogging For Business: How To Do It Right


A well-planned blog can be good for your business and your customers.


Blogging is just one of many marketing tactics available to SMEs looking to promote their business. Easy to get started and inexpensive, a business blog can prove a powerful tool within any online marketing strategy, provided it’s done correctly.

Read More »

Does Your Business Delete Data Well Enough?


Recovered files can be a goldmine for criminals and competitors.


How do you completely delete data from hard disks and solid-state drives? Do you simply hit Delete and then empty your computer’s recycle bin? Or do you take things a step further and format your drive? Either way, the information you’re trying to get rid of is likely still retrievable. In fact, it’s almost impossible to ever delete anything entirely, and for businesses and other organisations, that can easily spell trouble.

Read More »

Categories

Download The TMB Guide To Cyber Security Now!

Recent Posts

Follow Us