5 security trends which will reshape business in 2017

Posted by:

In 2016 it was revealed that personal data from 2.7 billion user accounts at major companies such as Yahoo, Dropbox, MySpace, and LinkedIn, were put at risk as a result of security breaches. That’s the equivalent to more than every single Facebook account being compromised. There is a concern, highlighted by the National Institute of Standards and Technology (NIST) that majority of the typical computer users experience security due to the frequency of the large-scale hacks which leaves people feeling ...

Continue Reading →
0

IT security – Cloud Versus On-site

Posted by:

The facts about IT security

IT security is a topic of conversation that is likely to be a cause for concern for companies of all sizes. There is a perception that larger businesses have superior security, but this isn’t always true. Just ask telecoms giant TalkTalk who were hacked in 2015 and had significant amounts of data stolen, leading to some customers falling victim to fraud. Yahoo also had a few issues which led to the login details of over a ...

Continue Reading →
0

5 ways a Hosted Desktop can Benefit Estate Agents

Posted by:

Whats not to like about the Cloud? Secure, cost effective and unshackles you from the office. Some business categories can benefit more than others – Estate agents to name but one, we have put together what we consider the top 5 reasons why Estate Agents should consider making the switch:

1. Disaster recovery
Whats the worst that could happen? If disaster struck and you lost all or some of your client information what would be the repercussions to your business. How ...

Continue Reading →
0

Ransomware scams cost £4.5m per year

Posted by:

More than 4,000 Brits have had their computers infected with ransomware this year, with over £4.5m paid out to cyber criminals, according to Action Fraud.

Ransomware is a type of malware that encrypts files of infected PCs before demanding an extortionate payment for the encryption key needed to recover data. The malware typically arrives in the form of malicious email attachments prospective marks are encouraged to open or through exploit kits that exploit software vulnerabilities to push malware onto the PCs ...

Continue Reading →
0