6 Cyber Security Threats to Expect in 2022

The pandemic brought a seemingly endless wave of challenges to almost all businesses. Most of these challenges were unique to each industry, but there was one unavoidable hurdle that all businesses no matter the industry had to overcome, Cyber Security. As lockdowns became stricter and working remotely became the standard businesses were forced to rapidly digitalise almost overnight, unfortunately doing this so suddenly left many businesses open to a number of cyber threats that still persist today.

Read more

Why Bitwarden Could be a Security Game Changer

According to a study by IBM ‘95% of cyber security breaches are caused by human error’, this can be anything from clicking a phishing email to having a weak password. If any of these attacks are successful, your business could be met with significant consequences. These consequences include but are not limited to, business operations coming to a halt, reputational damage, and even financial loss; and with the average cost of a data breach being the highest its been in 17 years at £3.36 million, according to a study by ITPro, password hygiene should be a top priority in 2022. With this in mind, it’s clearly more important than ever to have a secure and streamlined way to manage your account data, and we believe we've found the tool to help you do so.

Read more

6 Ways to Avoid Getting Caught Out by Phishing

Cyber-criminals use email and text messages to trick you into giving them your personal information. These cyber-criminals are looking to steal your passwords, account numbers and other important data. Obtaining this information means criminals could gain access to banks, emails, or other accounts in turn causing a data breach, and with a study by IBM finding the average recovery cost of a data breach to be approximately £3.1 million, allowing this to happen would be catastrophic.

Read more

entrustIT Ltd retain both ISO certifications in 2020!

The team at entrustIT Ltd are thrilled to reveal that despite the disruption due to the ongoing Coronavirus (COVID-19) pandemic, we have retained both our ISO certifications in 2020!

Read more
cloud cctv dome camera

How does Cloud CCTV Recording work?

In a previous blog, we discussed Cloud CCTV and how it works for businesses. We discussed how Cloud CCTV differs from “traditional” CCTV, how it works for the end user, and how you can take advantage of this service. In this blog, we will go slightly further, describing exactly how the recording function of Cloud CCTV works in a technical sense. This blog will help you to understand where your CCTV recordings go, what effect that has on your internet bandwidth, and what the differences are between our two packages: VideoIT Essentials and VideoIT Advanced.

Read more

How you can stop cyber criminals impersonating you.

Email is the primary tool used in business, from internal communication to customers, making it an effective place for cyber criminals to target their victims. According to Avanan’s phishing statistics, 1 in every 99 emails is a phishing attack. This amounts to 4.8 emails per employee in a five-day work week!

Read more
Online banking against tablets and smartphone

The worst passwords of 2019...have we learned nothing?

Those that follow this blog will remember that we wrote about the worst passwords of 2018 at the beginning of the year. This blog proved to be popular, with many surprised at the sheer prevalence of weak passwords.

Read more
pawel-czerwinski-RovCBKMfK_k-unsplash

How you can keep your data safe in a world full of threats.

In today’s modern world, data is king. In 2017, data toppled oil as the new most valuable commodity. As with any valuable resource, there are always individuals that wish to steal or harm it. The story is no different with data. Computer viruses are by no means new, but in recent years the sophistication and frequency of cyber-attacks has grown exponentially. Well publicised attacks such as WannaCry in 2017, which shut off NHS trust hospitals across the country, serve as reminders of this reality. Interested in learning more about how Managed Services can free up resource and reduce the risk of cyber attacks in your business? Learn more about the problems they solve here >>

Read more
Businessman hand with loudspeaker and icons flying out

Microsoft launches Windows Virtual Desktop

After being initially announced last year, Microsoft have now launched their Windows Virtual Desktop (WVD) for public preview. It is a comprehensive desktop and app virtualisation service running in the cloud. You can deploy and scale Windows and Office on Azure in minutes and the service offers a multi-session Windows 10 experience and optimisation for Office 365 ProPlus.

Read more
Stressed businessman with head in hands at office

What you should do if your business is hacked!

It is something all businesses dread. You have been hit by a cyber-attack. Despite our best efforts, cyber attacks are on the increase and it is now more of a question of when, not if your business is attacked. Cyber attacks can happen for a number of reasons but research has shown that in 2018, 48% of data security breaches are caused by acts of malicious intent with human error or system failure accounting for the rest.

Read more

Subscribe here!

Recent posts

Posts by tag

See all