Keeping Your Business Secure During The Summer Shutdown

When you’ve finally earned your escape to the beach, the last thing that should be on your mind is the threat that everything will fall apart in your absence. Taking a few simple precautions can make the difference between an uninterrupted break and an urgent flight home. Here’s a quick guide to keeping your business secure during the summer shutdown

Read More »

Cyber Essentials Is Changing – But Will It Be Better?

Government responds to consultation results.


Five years on from its initial inception, the government-run security scheme Cyber Essentials is changing. By April 2020, a new model is expected to be in place, with more changes set to follow.

Read More »

Why You Should Install The Windows 10 Update Next Month

Security and reliability, plus new features expected


Next month will see a major update for Windows 10 users. How do we know this is coming in October? Because Microsoft has cunningly labelled it the October 2018 Update. While we don’t yet know the exact date, rumours are suggesting that it could very well be upon us at some point during the first half of the month.

Read More »

Why Connecting To Hotel Wi-fi Could Be A Security Risk


Even the complimentary mint on your pillow won't cheer you up if you're targeted

Connecting to hotel wi-fi is part and parcel of most business trips. Complimentary internet access means not having to tether to your phone and use up your data allowance for the month. You can read your emails, browse the web and maybe watch Netflix if the connection is fast enough. But how do you know the connection is secure?

Read More »

Meltdown And Spectre - The Computer Flaws That Affect Practically Everyone


People are calling them the worst computer flaws to be discovered for decades. But what do Meltdown and Spectre mean for you?

Two fundamental flaws have been discovered in computer processors that will affect the vast majority of businesses and consumers around the world. Dubbed Meltdown and Spectre, they make it possible for hackers to gain access to private information, including passwords, stored in temporary memory.

Read More »

The 3-2-1 Rule: Backups That Could Help Avoid Disaster


Can you really secure your business data in three steps?

Creating backups doesn’t have to be complicated or painful, but it does need to be effective. That’s why at TMB, we recommend using what’s known as the 3-2-1 rule to guide your backup routines. It’s straightforward, easy to remember and it insures against data loss in multiple ways.

Read More »

1.4 Billion Stolen Passwords Found On Dark Web Forum


A stark reminder to us all about password security


More than 1.4 billion stolen passwords and other credentials have been found in a plain text file, which was posted in a dark web forum. Security threat intelligence company 4iQ discovered the 41GB file on 5th December, and after a few days of sifting through the data, it reported on its findings so far.

Read More »

Passwords For Chocolate: The Gift That Keeps On Giving


Would you give up your passwords for free chocolate? Many people would, the media tells us - repeatedly. Why, though, does this story keep popping up?


Passwords are important. But not as important, it would seem, as chocolate. Since 2004, the idea that people will exchange their passwords for chocolate has made headlines several times. Numerous publications have indicated that the offer of free confectionery is all it takes to make folk forget basic security measures.

Read More »

The Three-Pronged Backup Regime That All Businesses Should Follow


Making backups of important files is vital for businesses of any size. And to be really safe, you shouldn't do it in just one way but three.

Like kale and star jumps, creating backups is one of those things that’s good for you, but not much fun. Indeed, just like those things, they might even seem unpleasant – in the short term at least.

Read More »

What The MacOS 'Root' Flaw Can Teach Businesses


This week, a major security flaw was found in Apple's MacOS operating system. When lessons can businesses learn from it?


As gaping security holes go, the one recently discovered in MacOS High Sierra was particularly monumental. Uncovered by researcher Lemi Orhan Ergin (who posted it on Twitter, much to Apple’s displeasure), it showed how even the richest, most experienced technology companies in the world can get things frighteningly wrong.

Read More »
Download The TMB Guide To Cyber Security Now!

Recent Posts

it-jargon-buster-large-cta

Follow Us

New call-to-action