06Apr

Invoice Scams

In the last few days we have seen the rise of more invoice scams. Spear Phishing attacks against accounts teams, pretending to be from the MD requesting money transfers and emails pretending to be from suppliers, containing invoices which are actually Trojans. Spear Phishing Spear Phishing attacks happen where an attacker uses public information to attack a specific individual. In this instance, the attacker gained the name of the MD and faked an email address from him then asked a seemingly innocent question to build confidence. The conversation is below: Attacker: What is our cut off time and transfer limit for a same day payment?  Regards [Name of MD]  Sent from my iPhone  Accounts: I am not sure.  I need ...

Read More...
01Feb

HP Battery Safety Recall

Important Update Safety Announcement 2017 Following on from the HP Notebook Computer Battery Safety Recall and Replacement Program of June 2016, there have been additional batteries which have been affected by the issue. HP urges customers to recheck all potentially affected products. We are strongly advising anyone with an HP Laptop to check and see if your product is affected by this issue: - http://www.hp.com/go/batteryprogram2016 Download this pdf for further information.

Read More...
12May

Mapping in Excel 2016

I WAS RECENTLY ASKED BY A CLIENT HOW WE CAN MAP THE COMPANIES THEY WORK WITH AND IN THE PAST THIS WAS SOMETHING THAT YOU HAD TO BUY AS A SEPARATE PRODUCT, E.G. MAP POINT THOUGH THIS WAS DISCONTINUED IN 2014. However, I had read something about Excel now having the feature and decided to look into it. I found that Excel does indeed have many different mapping options and what I want to show here is how you quickly map postcode information. Firstly setup your Excel list, in this case I have made some fictitious data and some random postcodes. Postcode Number of visits Name Category TN7 4AA 16 Site 1 Key Client TN23 9QB 8 Site 2 Normal ...

Read More...
24Mar
Seminar Summary

Seminar Summary

LAST WEEK WE HOSTED OUR FIRST EVER INFORMATION MANAGEMENT AND SECURITY SEMINAR AT THE ROYAL WELLS HOTEL . WE WERE THRILLED AT HOW POPULAR IT PROVED WITH OUR SAFETY SAVVY CLIENTS, BUT IF YOU WERE UNABLE TO MAKE IT, OR NEED A LITTLE REMINDER OF WHAT WE COVERED ON THE DAY, WE’VE PUT TOGETHER A SUMMARY OF THE MOST IMPORTANT POINTS. A Growing Threat We kicked off by looking at how real the threat to our data and information was, and how seriously we should take it. The answers were very, and very. We saw how in just three years the cost of a single security breach has risen from £15-30,000 to £75-310,000. When you take into account (literally), the ...

Read More...
10Mar
Double up on your protection, authentically

Double up on your protection, authentically

WITH OUR RECENT FOCUS ON RANSOMWARE AND THE EFFECTIVENESS OF CLOUD BASED SYSTEMS AND LONG TERM BACKUP IN COUNTERING SUCH THREATS, WE’LL NOW LOOK AT WAYS OF ENHANCING THEIR SECURITY AS A FURTHER MEASURE. IN PARTICULAR WE’LL BE FOCUSING ON DUAL-AUTHENTICATION, ALSO KNOWN AS MULTI-FACTOR AUTHENTICATION. When it comes to cyber security and authentication of data, we tend to talk about factors – elements that can be built in to your protection. Typically, there are three such factors that we rely on: Something that you know Something that you have Something that you are The first is probably the one we’re all most familiar with. Your username and password is a prime example of something that you know. So in ...

Read More...
03Mar
Weary of Ransomware

Weary of Ransomware

A FEW WEEKS AGO, RANSOMWARE HIT THE HEADLINES AFTER LINCOLNSHIRE COUNTY COUNCIL'S SYSTEMS WERE SHUT DOWN IN THE WAKE OF A SUCCESSFUL MALWARE ATTACK. Delivered as the usual Trojan, in this case via email, the authority was asked to pay a ransom of $500 in the digital currency bitcoin for the key. The cyber criminals responsible also threatened to keep increasing the bounty if their initial deadline wasn't met. In the end, the council stoically shut down all of its systems for the better part of a week, relying on their body of staff to field calls and rely on “pen and paper,” to maintain service. 458 servers and 70 terabytes of data were then routinely checked and cleaned. Although ...

Read More...
19Feb
Nine Steps to Better Password Security

Nine Steps to Better Password Security

PASSWORDS HAVE BECOME AN EVERYDAY SECURITY MEASURE THAT MANY OF US FIND A LITTLE IRKSOME. AND IF HISTORY HAS PROVEN ANYTHING, IT’S THAT PASSWORDS ARE EASY TO FORGET. It’s also easy to ignore keeping them up to date or how important they actually are when it comes to our digital security. So we've put together nine steps that will help you establish an effective routine that will help keep you stay protected and keep those seeking your passwords guessing! Remove all post-it notes and notebooks containing passwords from your desk Neville Longbottom from the Harry Potter series had such trouble remembering the passwords that would give him access to the Gryffindor common room that he took to writing them down. ...

Read More...
08Feb
Malware: Now Where?

Malware: Now Where?

ALMOST EVERY ASPECT OF OUR PERSONAL AND WORKING LIVES NOW COMES WITH THE ADDED ENHANCEMENT OF TECHNOLOGY. Our reliance on it for ease of interaction with our environment has created a dazzling stage for innovation. The last decade has seen exponential growth in personal and other data, harvested on a proliferation of devices. As sight, sound and touch technologies introduce new dimensions for us to explore, they also provide new vectors from where our vulnerabilities can be preyed upon. In essence, our world is now portable and mobile, and therefore so is the security threat. Clearly, as the number of ways we stay connected grows, so too does the size of our digital world that needs protecting. Today there are ...

Read More...
04Jul

Dealing with Data

THE GROWTH IN DATA CONSUMPTION AND HOW WE CAN MANAGE IT MORE EFFECTIVELY. Computers, mobiles, the Internet; they are changing the world faster than most of us can keep up. And as our daily lives become more entwined with technology, the data we produce continues to spiral out of control. Let's look at the figures: Over 196 billion emails are sent and received each day (1) Nearly 6 billion searches are performed on Google each day (2) 100 hours of video are uploaded to YouTube every minute (3) 500 million Tweets are sent on Twitter each day (4) Netflix streams around 1 billion hours of content a month (5) As humans we are simply not equipped to efficiently deal with ...

Read More...
04Jul
The Changing Face of Communications

The Changing Face of Communications

ADAPTING OUR BUSINESSES TO TAKE ADVANTAGE OF FUTURE TECHNOLOGY In the year 2000 just half of UK adults said they had a mobile phone, it would have been extremely rare to find a teenager texting a friend and even rarer to see someone accessing the Internet via a mobile device (3G wasn't introduced in the UK until 2001). Today, it is reported that by mid 2014 4.55 billion people worldwide (over 60% of the global population) will use a mobile phone, with nearly 40% of those using smartphones. You would struggle to find a teenager without access to a mobile device and using smartphones to browse the Internet has become as much a part of everyday life as making phone-calls. ...

Read More...