Are You Lost in The Cybersecurity Jungle: Don’t Go Unprepared!

Cyber Security Jungle

Cybersecurity is like a jungle: a sprawling, bewildering landscape that businesses find hard to explore. As an IT Provider, we understand the uncertainty that comes with trying to navigate the complex world of cybersecurity. The jungle is vast, with threats hidden in the undergrowth if you set anything up incorrectly and the path to safety (and compliance) is not clear. Continue reading

What Cybersecurity Issues Are Hiding In Your Business?

Cyber Security

We are tend to ignore or put off issues that we don’t know about, think are too hard to fix or believe it won’t happen to me. Here are some of the most common cybersecurity issues faced by SMBs that that could leave your business in danger if left unchecked. Continue reading

MFA and Push Bombing

Cybersecurity
Online account hacking has become a major problem for both organisations and individuals. Think about how many online accounts you have that require a username and password both in your work environment and at home. Continue reading

What form of MFA Is The Best?

2FA / MFA Issues

With a lot of business processes now largely cloud-based, compromised passwords are the quickest and easiest way for bad guys to exploit computer systems. So how can you protect your online and offline accounts and data? The best way is with multi-factor authentication (MFA). See our blog article on Why Multi-Factor Authentication is Important.  Continue reading

8 Security Measures To Improve Your M365 Protection

Security TestingMicrosoft 365 (previously known as Office 365) is one of the best and most popular collaboration and productivity tools around. It provides users with seamless scalability, communication and supports remote work but as with all technology, it comes with its own particular security issues. Continue reading

Why You Shouldn’t Use SMS as your 2FA

2FA / MFA Issues

Every time you’re online and a site sends a separate code to check your identity, you’re using two-factor authentication. It has become the norm and if you are not doing this for all your online accounts then you should start straight away (check out our article on Why 2FA is Important). As with most things security wise, hackers have figured out how to get around the SMS code, too. This article shows you how they do it and how to stay safe. Continue reading

4 Things Your IT Partner Wishes You Did

IT Partnership

Making your IT support team’s life a little bit easier will free up their time, so they can spend more of it proactively protecting your business and its data.

Here are four things that you can start doing to make their life a little bit easier. Continue reading

O365 – Why you need to implement 2FA

Unknown threats

Why just passwords are not good enough?

As you know, Microsoft regularly release new options and new security features as part of their Office 365 platform.

As part of their focus on security, they highly recommend that all users implement 2FA or MFA on all their O365 accounts. Continue reading