Email attacks are on the rise

Email phishing

Email attacks A report by Mimecast, who assess the efficiency of popular email security systems, claims that the number of Business Email Compromise (BEC) attacks have risen by 269% compared to the previous three months, showing a huge spike in such assaults. BEC attacks are emails carrying viruses or other forms of malware, and/or malicious […]

How can I protect my email from malicious attack?

How can I protect my email from malicious attack? Many IT departments or IT companies will say “you need xyz product to protect you from 123” but the vast majority of cyber attacks are the result of a phishing campaign against the company. No matter what email service you use (Office 365, Gmail or another); […]

The Cost of Ransomware

Businessman hand holding money banknote for paying the key from hacker for unlock folder got ransomware malware virus computer

The Cost of Ransomware Hackers have frozen a global organisation with 22,000 computers across 170 different sites around the world for the last 3 months. Hackers who operate Ransomware Cyber-attacks demand extortionate amounts of money to reinstate systems but Norsk Hydro refused to pay the hackers demand but so far they’ve spent £45m trying to […]

Amshire gains Cyber Essentials certification

Amshire has achieved the Cyber Essentials accreditation, a UK government backed standard for companies taking all necessary steps to protect themselves from cyber-attacks and to keep customer data safe. Cyber Essentials accreditation is also a requirement for all businesses planning to bid for government contracts that involve handling personal information. Certification is included as part […]

Beware Locky is back with new variants

Beware Locky is back

Locky, thought to be dead, was one of the first major forms of ransomware to achieve global notoriety.  However, it appears to have risen from the crypt with new variants, Lukitus and Diablo. Notorious attacks have returned with distribution through the Necurs botnet, one of the largest botnets in use today! Recent activity shows that it […]

Would your Business survive a Cyber-Attack?

Cyber-Attack Many small or medium sized firms don’t consider themselves a likely target for a cyber-attack.  Due to the increase of business done online and sensitive information being stored electronically these businesses are an attractive target! Cyber-Security Policy (CSP) Cyber security breaches affect all businesses.  Recent research showing that 52% of breaches were indeed caused […]

How much did your Computer System cost last week?

FREE no-obligation Audit

How much did your Computer System cost you last week?  Many people would find this question difficult to answer. Computer System Often the real costs are concealed in many ways, such as those listed below: – Lost time due to unreliable systems Network issues Staff leaving work undone to assist others with computer problems Misuse […]

How to make big data work for you

How to make big data work for you Often, the image surrounding Big Data focuses on how giant corporations can hoover up an extraordinary amount of information.  Feeding it into powerful computers creating a stream of crucial analysis and insights, thus saving itself billions.  Certainly a cliché, there are big companies harvesting incredibly large amounts […]

Time to upgrade

Time to upgrade Here are some indications as to when it may be time to upgrade your business IT system.  Look at doing a more wholesale upgrade. Your business is growing – time to upgrade It may be that you’re employing more people, developing new products and services, or expanding into new premises. You’re having […]

Securing your connection with the World outside

Securing your connection with the World outside Your business literally hangs by a thread of copper or fibre with the outside world.  Securing your connection is a must.  Should it become severed then business will rapidly grind to a halt. It is wise to look beyond your immediate surroundings when developing a Disaster Recovery Solution.  […]