Passwords are no longer secure – add two factor authentication

Passwords - Two factor authentication

The default for all User logons whether local or remote has always been reliant upon the humble password.  Considered “good enough” security in the past, passwords known to be the weakest link, staying connected in the modern world. There are reports in the media all too often about passwords being stolen, either electronically or by […]

2-minute Cyber Security Interview

Cyber Security Interview

Cyber Security Interview David Parkes, Sales Engineer of Amshire had an interview with Consort IT Ltd.  This was to discuss how businesses can improve their cyber security in the era of ransomware attacks and CryptoLocker viruses.  David explains why a layered security approach and a robust Disaster Recovery is the best solution. What do you […]

Cyber Crime – 5 steps to better Cyber Security

5 Steps to better Cyber Secuirty

 5 steps to better cyber security The cost of cyber crime is high.  Both in terms of the immediate financial loss and the productivity which is impeded by downtime.  It is therefore important for organisations to do everything they can to protect themselves. The problem facing many SMBs is that they do not have the […]

Cyber Security – Understanding the threat

Cyber Security - Understanding the threat

Understanding cyber threats The cybersecurity landscape is always evolving.  Cybercriminals continue to seek out new ways to exploit vulnerabilities, whilst security specialists release new patches and protocols to counter or mitigate such cyber threats. It is possible to hone in on several key factors that are contributing to the increased threat level facing SMBs. The […]

The year Cybercrime became the new normal

The year Cybercrime became the new normal

Cybercrime 2017 the year Cybercrime became the new normal.  The cybersecurity landscape changed immeasurably after several high-profile attacks caused major disruption around the World. In the UK, the WannaCrypt0r 2.0 ransomware attack (also known as WannaCry) brought the NHS to a standstill.   A&E departments, outpatient centres and GP surgeries were forced to close in a desperate […]

Wall of Fame – twitter hashtags

Twitter - social media

TWITTER HASHTAGS Used strategically, twitter hashtags provide many benefits, and can be used to ensure your content is shown to a larger audience.  This helps to raise awareness about your brand.   It can also target a specific group of people too.  Using hot trends and topics will also boost your SEO. Hashtags are important because […]

Is your business protected against a cyberattack?

Amshire - Ransomware Attacks via RDP

What cybersecurity risks does your business face? The cyberattack in May 2017 affected 40 hospitals and 24 NHS Trusts, as A&E departments across the country were forced to shut their doors to patients in need.  High profile attacks like this have brought cybercrime to the forefront of public discourse.  But many business owners, especially of small […]

Disaster Recovery Plan – your data covered 24/7 365

Disaster Recovery Plan (DRP)

Disaster Recovery Plan (DRP) Is your data covered 24/7 365?  Do you have preventative measures in place for a Disaster Recovery Plan (DRP)? No one likes to think a disaster is going to happen to them, however, preparing for disaster situations and putting in place plans for recovery can make all the difference between businesses […]

Beware Locky is back with new variants

Beware Locky is back

Locky, thought to be dead, was one of the first major forms of ransomware to achieve global notoriety.  However, it appears to have risen from the crypt with new variants, Lukitus and Diablo. Notorious attacks have returned with distribution through the Necurs botnet, one of the largest botnets in use today! Recent activity shows that it […]

Would your Business survive a Cyber-Attack?

Cyber-Attack Many small or medium sized firms don’t consider themselves a likely target for a cyber-attack.  Due to the increase of business done online and sensitive information being stored electronically these businesses are an attractive target! Cyber-Security Policy (CSP) Cyber security breaches affect all businesses.  Recent research showing that 52% of breaches were indeed caused […]