<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=1538418&amp;fmt=gif">

Have You Thought About Remote Working And Cyber Security?

Working from home is great, but doing it securely is even better.


Being receptive to the idea of remote working is one thing; having the resources and technology to do it is quite another. And then there’s security. How do you open up your IT solutions to your workforce when they’re not in the office, without opening them up to the whole world? In other words, how do you successfully pull off both remote working and cyber security at the same time.

Read More »

Why Does Cyber Security Actually Matter?

You'll often hear the phrase "cybersecurity" come up when people are discussing IT, and especially in the context of business. You've probably gathered that it's an important subject – but why, exactly? Why is maintaining good cybersecurity so crucial, and what are the key points that SMEs should know about? Here's a run-down of the key points.

Read More »

Cybersecurity For Charities: Why Does It Matter?

Good causes means nothing to hackers


They may raise money for good causes, such as homeless people, the environment and endangered animals, but to criminals, charities are just another source of money to steal from. And with so much of their operations being carried out digitally, cybersecurity for charities is every bit as important as it is for businesses.

Read More »

6 Cybersecurity Tips Your Business Should Follow To Give It A Headstart

In this age of information, cyber breaches in businesses are as impactful, if not worse, than physical break-ins. According to the Cyber Security Breaches Survey 2018, over 40% of businesses in the UK have been compromised at one point in their lifetime. Organisations should, therefore, prioritise measures that shield them against such attacks.

Read More »

4 More Tips For A Secure Password

Unauthorised access to business information can be disastrous, with effects ranging from loss or corruption of sensitive data to the exposure of customer data to people with malicious intent. Hackers are always coming up with new techniques to breach individual and organisational security. However, most cyberattacks are opportunistic and unsophisticated, using basic techniques to exploit glaring vulnerabilities. A strong password is enough to stop many would-be cyberattacks and garden variety hackers in their tracks.

Read More »

Windows 7 And Windows Server 2008 Reach End Of Life In Less Than A Week

What should businesses do to make sure they're covered?


In less than a week, on Tuesday 14th January 2020, Microsoft will end extended support for Windows 7, Windows Server 2008 and Windows Server 2008 R2. Beyond this point, it will no longer issue security updates for any of these operating systems, having already stopped introducing new features when mainstream support ended.

Read More »

2020 Pegasus Seminars: Reserve Your Free Seats Today!

This year’s Pegasus seminar dates are now available!


As an award-winning Pegasus Software partner, with our own in-house Pegasus support team, TMB Group has a long history of showing businesses how to use solutions like Opera 3 effectively and efficiently. A major part of that is our Pegasus seminars, which we use to keep our customers up to date with the latest changes to their applications and to discuss relevant legislation. Now, we’re taking registrations for our latest Pegasus seminars, and this year we’re changing things up a bit – including opening up these free events beyond our existing Pegasus customer base.

Read More »

Why Is It So Hard To Catch Cybercriminals?

Do the crime but never do the time.


The idea of good conquering evil is a staple of Western fiction, from novels and plays to movies and TV shows. In the vast majority of cases, you know the hero of the story is going to win in the end, because that's how it's meant to be. It's a nice thought, but in reality, that’s not the case at all: criminals nearly always get away with it – and nowhere is that more evident than with cybercrime. Although the authorities have succeeded in capturing hackers in the past, the vast majority of cybercriminals never face any consequences for their actions. What makes it so difficult to catch them?

Read More »

Why Cloud Backups Are Better Than USB Disks And Tapes

If you're still using legacy solutions, you could be creating more work for yourself for no real benefit.


One of the most fundamental bits of IT advice is that all businesses should keep multiple backups of their important data. That way, you have more places to restore from, and therefore more chance of getting your files back. 

It's also a good idea to keep at least one copy off site. By doing so, you protect this data from any incidents that affect the copies stored on your premises. Traditionally, this has meant using USB disks or magnetic tapes, which are rotated throughout the week and taken off site each day.

But the cloud has changed all of that. Today, the best way to keep backups away from your business premises is to store them online. Here’s why.

Read More »

Why Passwords Are No Longer Enough

Humans are simply too unreliable.


There are two golden rules when it comes to passwords. Keep them strong, and don’t reuse them. It’s simple, straightforward advice, and it can make a real difference to the security of user accounts. Yet far too often people fail to follow this guidance, leaving themselves and their employers vulnerable to serious security breaches. Bearing this in mind, it’s becoming increasingly clear that businesses can no longer rely on passwords alone to keep their data safe.

Read More »
TMB - Pegasus Opera 3 - Large CTA

Recent Posts

Follow Us

New call-to-action