<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=1538418&amp;fmt=gif">

Windows 7 And Windows Server 2008 Reach End Of Life In Less Than A Week

What should businesses do to make sure they're covered?


In less than a week, on Tuesday 14th January 2020, Microsoft will end extended support for Windows 7, Windows Server 2008 and Windows Server 2008 R2. Beyond this point, it will no longer issue security updates for any of these operating systems, having already stopped introducing new features when mainstream support ended.

Read More »

2020 Pegasus Seminars: Reserve Your Free Seats Today!

This year’s Pegasus seminar dates are now available!


As an award-winning Pegasus Software partner, with our own in-house Pegasus support team, TMB has a long history of showing businesses how to use solutions like Opera 3 effectively and efficiently. A major part of that is our Pegasus seminars, which we use to keep our customers up to date with the latest changes to their applications and to discuss relevant legislation. Now, we’re taking registrations for our latest Pegasus seminars, and this year we’re changing things up a bit – including opening up these free events beyond our existing Pegasus customer base.

Read More »

Why Is It So Hard To Catch Cybercriminals?

Do the crime but never do the time.


The idea of good conquering evil is a staple of Western fiction, from novels and plays to movies and TV shows. In the vast majority of cases, you know the hero of the story is going to win in the end, because that's how it's meant to be. It's a nice thought, but in reality, that’s not the case at all: criminals nearly always get away with it – and nowhere is that more evident than with cybercrime. Although the authorities have succeeded in capturing hackers in the past, the vast majority of cybercriminals never face any consequences for their actions. What makes it so difficult to catch them?

Read More »

Why Cloud Backups Are Better Than USB Disks And Tapes

If you're still using legacy solutions, you could be creating more work for yourself for no real benefit.


One of the most fundamental bits of IT advice is that all businesses should keep multiple backups of their important data. That way, you have more places to restore from, and therefore more chance of getting your files back. 

It's also a good idea to keep at least one copy off site. By doing so, you protect this data from any incidents that affect the copies stored on your premises. Traditionally, this has meant using USB disks or magnetic tapes, which are rotated throughout the week and taken off site each day.

But the cloud has changed all of that. Today, the best way to keep backups away from your business premises is to store them online. Here’s why.

Read More »

Why Passwords Are No Longer Enough

Humans are simply too unreliable.


There are two golden rules when it comes to passwords. Keep them strong, and don’t reuse them. It’s simple, straightforward advice, and it can make a real difference to the security of user accounts. Yet far too often people fail to follow this guidance, leaving themselves and their employers vulnerable to serious security breaches. Bearing this in mind, it’s becoming increasingly clear that businesses can no longer rely on passwords alone to keep their data safe.

Read More »

Should Companies Be Held Responsible For Rogue Employees?

So far, the courts say yes, but that could change. 


If one of your employees stole all the personal data held by your business and then sold it on the dark web, should you be held responsible for their actions?

On the face of it, you might expect the answer to be a resounding ‘no’, but it’s not that simple. Organisations that process data have a legal duty to protect it, and they can be fined significant sums by the Information Commissioner’s Office if they let it fall into the wrong hands.

Read More »

Are Zero-Day Exploits Overhyped?

Security experts suggest worrying about something else.


One of the big challenges of cyber security is that it’s often reactive. Hackers find new ways to crack into systems, and then security companies come up with ways to stop them. When the hackers find previously undiscovered vulnerabilities in software, these are known as zero-day exploits, and they’re often regarded as a major threat to cyber security. But according to security firm Tenable, zero-day exploits are overhyped and aren’t the real problem.

Read More »

What Is Cryptojacking, And Is Your Business Affected?

Hackers could be using your IT systems for profit, and you would never know. 


Has your business fallen victim to cryptojacking? This relatively new form of cyber crime is often subtle and hard to detect, and it can affect just about any device with an internet connection. So what is cryptojacking, and what does it mean for businesses?

Read More »

Cyber Security & The Supply Chain

It's not just your own defences you should be concerned about.


Taking care of your own cyber security should be your priority, but breaches suffered anywhere in your supply chain can cause your business problems.

As the metaphysical poet John Donne once wrote, "No man is an island". The same can be said for businesses. Whether your organisation is a huge multinational, a one-man band or anything between, it doesn’t function in isolation; at some point, you have to rely on other businesses.

Read More »

We Have Fire Drills. Why Don’t We Have Cyber Attack Drills Too?

Taking the threat seriously is a major part of protecting your business. 


It’s become something of running joke that workplace health and safety in this country has ‘gone mad’. Yes, there have been some decidedly odd decisions made in the name of injury prevention, but for the most part it’s just a myth. There are hundreds of thousands of workplace injuries every year, and health and safety rules help to keep that number down. We have these rules for the same reasons we nominate workers to be first aiders and fire marshals. What’s odd is that we don’t do the same for cyber security.

Read More »
how to choose an it support company guide

Recent Posts

it-jargon-buster-large-cta

Follow Us

New call-to-action