Complete I.T. Blog
Test Your Incident Report Planning Knowledge With Our Quiz
Take the quiz! Take our short quiz to test your knowledge!Visit our blog for more informationGet in touch with our team
How to Reduce the Risk of a Personal Data Breach
Preventing every data breach from happening may not be possible but there are many ways you can minimise the risk.Strengthen your passwords Having a weak password leaves you vulnerable to an attack. Ensuring you use a mixture of letters, numbers and symbols will help...
The State of Ransomware 2021
This month, a significant amount of media reporting has focussed on cyber security threat forecasts for 2021. Unsurprisingly, the continued rise and complexity of ransomware features heavily in almost all of these predictions, with the major forecast being that these...
Women in Tech: Harriet’s Story
Deciding what to do with the rest of your life when you are in sixth form can seem like a daunting decision, especially when you hear that many middle-aged people have no idea what they would like to do as their career. You will often make the decision for further...
Beware of This New 2FA and MFA Scam
Two-factor or multi-factor authentication is a great tool to help fight back against cyber criminals and keep your data safe. We always recommend setting up multi-factor authentication on devices and applications wherever possible because it makes it a lot harder for...
How Technology Kept Us Going
2020 was an unusual year to say the least. One which none of us could have predicted to the extent that we experienced. However, it did happen, and as I write this, the effects of COVID-19 mean we continue to adapt. Our sofas, kitchens and dining room tables became...
5 Business Goals for 2021
The beginning of a new year is often a time to reflect on the things we have learnt, what we may have done differently and to celebrate the successes of the previous year. We have put together a list that we recommend you re-view whilst planning for the coming...
12 Days of Cyber Crime
Our rendition of the 12 days of Christmas may be filled with Christmas cheer but it has a very real message about Cyber Security.On the twelfth day of Christmas the dark web sent to me... Twelve scammers scamming,Eleven hackers hacking,Ten trojans baiting, Nine...
5 Ways to Stay Cyber Secure While Working Remotely
This year many businesses have had to move to remote working due to the COVID-19 pandemic. Since then, there has been a shift in what threats are perceived as a greater risk to businesses. According to the 2020 Netwrix Cyber Threats report, in the UK, accidental...
What is a Trojan Virus?
A Trojan horse is a type of malware that tricks a user into thinking the content of a file is safe. Much like the wooden horse used by the Greeks to trick the Trojans, a file will appear to be normal on the outside, but on the inside is harmful and opens the user up...
What Should I Do if I Get a Scam Call?
Banking, pension, and HMRC scams are all common types of phone scams. Fraudsters will try to instil panic by saying that there is an urgent issue and serious repercussions will occur if you do not act instantly. This is common for all types of scams, especially...