

Disaster Recovery vs Backup: What is the difference?
Picture the scene: a staff member receives an email that appears to be legitimate. They click on an attachment in the email and within minutes their computer is encrypted. Because their computer is connected to your office network, before long all of your computers are encrypted. You have been the victim of a ransomware attack, something that happens on a daily basis for businesses up and down the country. To ensure this scenario does not play out in your business, you need a robust security solution. Disaster recovery and backups are two key components for this. However, both terms are often misused or misunderstood in the business world. Many either mistake backup for disaster recovery, or believe that they can have one without the other and remain protected should the unexpected occur.
Read more
A round up of our top blogs from 2020.
Can you believe its nearly 2021? What a year it has been! I’m sure we can all agree it has been one like no other. Throughout this time, we still been able to cover a host of topics in the entrust IT Group blog – from cyber security insights to tips for working remotely amid the pandemic and much more.
Read more
10 Unnerving Facts About Cybercrime During The Covid-19 Pandemic
2020 has had no shortage of difficult headlines. The pandemic has touched our lives in unprecedented ways. It has put health at risk, business at risk, social lives on hold. The pandemic has also emboldened cyber criminals. Many are using the Covid-19 crisis to profit from malware and social engineering attacks.
Read more
How to formulate a disaster recovery plan
What do you think of when you hear the word ‘disaster’? Perhaps it is an earthquake, or a wildfire, or maybe a global pandemic. Have you considered the word disaster in the context of your business? Every year, thousands of businesses face disasters in the form of cyber-attacks or hardware failure. These disasters can disrupt day-to-day business or, in some cases, can put a company out of business entirely.
Read more
Multi Factor Authentication: What it is, why you need it & how to use it.
These days, passwords are no longer being viewed as the most secure way to protect an account. Cyber criminals are advancing at an exponential rate as are the ways in which they can find out your credentials. By only using a password as an authentication method, the security of an account is based solely on the strength of a password, which, as years of research has proven, is not generally very strong – two-thirds of people use the same password everywhere, and many of the passwords they use are easily guessed.
Read more
Remote Desktop Service vs VPN: What is best for your business?
Since the start of the Coronavirus pandemic, we have seen a huge move towards the use of remote access technologies such as Remote Desktop Services and VPNs. The move came as many organisations were being urged to have their employees work from home in order to prevent the spread of Coronavirus – according to research, RDS use is up by 41% and enterprise VPN use is up by 33%.
Read more
The end of Privacy Shield: What does it mean?
On July 16th, The European Court of Justice (ECJ) officially declared that the EU-US Privacy Shield, a key data sharing mechanism, is invalid as they believe it fails to protect people’s rights to privacy and data protection. The historic decision will have substantial consequences and be a major headache for thousands of organisations that already exchange data with the US.
Read more
5 ways to secure remote working
2020 has been a turbulent year. The COVID-19 pandemic has caused major disruption to the global economy and has changed the way we all live our lives. However, as cases fall throughout the UK, we are seeing a gradual return to the workplace for many. Indeed, Government advice on home working changes from August 1st, and employees will now be actively encouraged to return to their place of work. That being said, the example of Leicester and the recent rise in cases in Spain, serves as a reminder that we will be living with this virus for many months to come, and localised lockdowns can come very suddenly.
Read more
How to conduct an IT audit in-house [+Free Template]
The word ‘audit’ is often enough to strike fear into even the most resolute business owners. What issues will an audit raise? Will I have to fix them right away? What if it is bad news?
Read more
5 cyber security trends to look out for in 2020
2019 was an interesting (and eventful!) year for cyber security. Breaches were hitting the headlines almost every week. According to research, the number of data breaches increased by 54% in the first half of 2019, with nearly 4,000 publicly disclosed breaches during that time.
Read moreSubscribe Here!
Recent Posts
Posts by Tag
- technology (81)
- business (55)
- Security (50)
- workplace (50)
- Microsoft 365 (42)
- cyber security (40)
- modern technology (40)
- cloud computing (39)
- office (39)
- Cloud (38)
- IT Security (38)
- Uncategorised (38)
- employees (38)
- productivity (38)
- Working from home (36)
- Microsoft Teams (35)
- Managed Service (34)
- microsoft (34)
- entrustit (33)
- flexible work (32)
- cloud it (31)
- office 365 (30)
- IT (29)
- efficiency (29)
- IT support (28)
- cyber attack (27)
- Hosted Workspace (25)
- hosted desktop (22)
- cyber privacy (20)
- independent schools (20)
- schools (20)
- school ict (19)
- Remote (18)
- computing (18)
- entrust (14)
- hacking (14)
- VoIP (13)
- collaboration (13)
- cybersecurity (13)
- passwords (13)
- public cloud (13)
- teamwork (13)
- GDPR (12)
- Password Security (12)
- network (12)
- password (12)
- 2020 (11)
- Coronavirus (11)
- Protection (11)
- data (11)
- Cyber (10)
- cloud voip (10)
- covid19 (10)
- office 365 support (10)
- private cloud (10)
- Hosted Desktop and Applications (9)
- it support dorset (9)
- ransomware (9)
- vulnerabilities (9)
- Windows Virtual Desktop (8)
- digital (8)
- eu (8)
- hack (8)
- hosted applications (8)
- it support hampshire (8)
- staff (8)
- telephony (8)
- uk (8)
- Backup (7)
- Google (7)
- Microsoft Planner (7)
- hackers (7)
- hardware (7)
- internet safety (7)
- it consultancy (7)
- it consultancy hampshire (7)
- it support bournemouth (7)
- it support southampton (7)
- mobile (7)
- windows 10 (7)
- 2019 (6)
- Skype for Business (6)
- european union (6)
- internet (6)
- it consultancy bournemouth (6)
- it consultancy dorset (6)
- it consultancy southampton (6)
- it support winchester (6)
- management (6)
- offsite backup (6)
- windows (6)
- Azure (5)
- News (5)
- attack (5)
- brexit (5)
- cctv (5)
- cloud cctv (5)
- data breach (5)
- desk phone (5)
- email security (5)
- hybrid cloud (5)
- mobile phones (5)
- onsite backup (5)
- personal data (5)
- resources (5)
- software (5)
- virus (5)
- Apple (4)
- Facebook (4)
- Hampshire (4)
- WannaCry (4)
- apps (4)
- architect (4)
- child protection (4)
- covid-19 (4)
- education (4)
- hacks (4)
- infrastructure (4)
- ios (4)
- legacy (4)
- legal (4)
- legal it (4)
- phishing (4)
- planning (4)
- website (4)
- 3d design desktop (3)
- Bournemouth (3)
- Dorset (3)
- Google Drive (3)
- Government (3)
- IP (3)
- ISO (3)
- IT Director (3)
- IT costs (3)
- OneDrive (3)
- VPN (3)
- Zoom (3)
- budgets (3)
- designer (3)
- instagram (3)
- smartphone (3)
- trump (3)
- twitter (3)
- 2018 (2)
- 2021 (2)
- Attacks (2)
- BYOD (2)
- DR (2)
- DR planning (2)
- Desktop (2)
- Environment (2)
- Firewall (2)
- IT audit (2)
- Local (2)
- Microsoft Forms (2)
- NHS (2)
- New Forest (2)
- SharePoint (2)
- Tiva (2)
- Windows 7 (2)
- android (2)
- artificial intelligence (2)
- awards (2)
- bcs (2)
- citrix (2)
- closed cloud (2)
- computer performance (2)
- ddos (2)
- digital hub (2)
- disaster recovery (2)
- dropbox (2)
- exhibition (2)
- finalist (2)
- guide (2)
- innovation (2)
- internet of things (2)
- law (2)
- legalex (2)
- london (2)
- meetings (2)
- organisation (2)
- paypal (2)
- predictions (2)
- president (2)
- sme (2)
- storage (2)
- strategy (2)
- surrey (2)
- us (2)
- 1998 (1)
- 2016 (1)
- 5G (1)
- AMD (1)
- ARM (1)
- BBC (1)
- CAD (1)
- CEO (1)
- Case Studies (1)
- Gen Z (1)
- General (1)
- Go Integrator (1)
- Help (1)
- Ignite 2018 (1)
- Ignite 2020 (1)
- Leaders (1)
- MFA (1)
- Market (1)
- May (1)
- Multi Factor Authentication (1)
- MyAnalytics (1)
- PBX (1)
- PM (1)
- PaaS (1)
- Power BI (1)
- Privacy Shield (1)
- Regulation (1)
- WCry (1)
- WannaCrypt (1)
- acquisition (1)
- afc bournemouth (1)
- afcb (1)
- ashley madison (1)
- b2b (1)
- battersea (1)
- beach (1)
- big data (1)
- bloatware (1)
- blockchain (1)
- broadband (1)
- cambridge analytica (1)
- camcloud (1)
- canada (1)
- cia (1)
- clinton (1)
- cloud storage (1)
- cnn (1)
- copyright (1)
- cryptocurrency (1)
- digital transformation (1)
- dns (1)
- donald (1)
- dyn (1)
- east grinstead (1)
- election (1)
- equality (1)
- executive order (1)
- farnham (1)
- fax (1)
- football (1)
- gchq (1)
- grinstead (1)
- intel (1)
- intelligence (1)
- josh widdicombe (1)
- landmarks (1)
- learning (1)
- legal technology forum (1)
- machine learning (1)
- macos (1)
- meltdown (1)
- millennials (1)
- mirai (1)
- no-deal (1)
- online meetings (1)
- paper (1)
- partnership (1)
- password manager (1)
- performance reviews (1)
- pound (1)
- premier league (1)
- proactive (1)
- procrastination (1)
- remote learning (1)
- research (1)
- serval systems (1)
- sharefile (1)
- snowden (1)
- solent (1)
- solent business awards (1)
- solentBA (1)
- spectre (1)
- sterling (1)
- storm (1)
- talktalk (1)
- teaching (1)
- trumppresident (1)
- ukitawards (1)
- united kingdom (1)
- united states (1)
- usa (1)
- vault 7 (1)
- video conferencing tools (1)
- vitality stadium (1)
- whatsapp (1)
- white (1)
- white house (1)
- wikileaks (1)
- wireless internet bournemouth (1)
- wireless internet southampton (1)
- women in business (1)
- xiongmai (1)
- year (1)