01323 404040
info@mtechsystems.co.uk
M-Tech SystemsM-Tech SystemsM-Tech SystemsM-Tech Systems
  • Home
  • About
    • Partners & Accreditations
    • New Customer Referral Program
    • Join Our Team
  • Solutions
    • Managed Services
      • Managed Technology
      • Managed IT Support
      • Managed Security Suite
    • Education
      • Technology for Education
      • Cyber Security for Education
      • Microsoft 365 for Education
      • Microsoft Teams for Education
      • Google Classroom
      • Broadband for Education
      • Lightspeed Systems Solution Suite
      • Multi-Academy Trusts
      • Lenovo Tech 4 Learners
      • InVentry Sign-In Solutions
    • Cloud & Communications
      • Cloud Solutions
      • mtech.cloud
      • Unified Communications
      • Hosted Telephony
      • Social WiFi Marketing
    • Connectivity
      • M-Tech CloudConnect
      • M-Tech HyperConnect
      • Buyer’s Guide to Connectivity
      • Connectivity Solutions
    • Productivity Tools
      • Microsoft 365
      • Google Workspace
      • Microsoft Teams for Business
    • Cyber Essentials
    • Client | Server Solutions
      • Virtualisation
      • Microsoft Desktop Management
      • Apple Device Management
      • Nutanix
    • Storage
    • Security & Threat Management
      • Dark Web Monitoring
      • Multi-Factor Authentication
      • Endpoint Protection
      • Next Generation Firewalling
    • Availability & Disaster Recovery
      • Backup & DR
      • Backup for Microsoft Office 365
    • Audio Visual
  • Experience
    • Case Studies
    • Testimonials
  • News
  • Contact

Cyber Security

A collection of our articles focusing on the ever-expanding, ever-changing world of cyber security.

  • Webinar: Cyber Security Challenges in the Education Sector
    The Growing Cyber Security Challenges to the Education Sector

    What was considered a tough approach a few years ago may now no longer be considered robust enough to fully protect your school or trust in the event of an attack.

    Read more

  • Hybrid Working and the Increased Risk of Cyber Attack
    Hybrid Working and the Increased Risk of Cyber Attack

    While hybrid working has many upsides, it also comes with added risk from the increased dependence on technology. As hybrid working is now a normal working style, valid concerns have been raised around how secure this model is. We’ve detailed some of the vulnerable areas in this blog post.

    Read more

  • Why a Password Manager is a Security Essential
    Why a Password Manager is a Security Essential

    It’s tempting to choose a single, memorable password and repeatedly use it, but this is one of the worst things to do. It is understandably very difficult to create unique passwords for the numerous accounts people have access to. This is where a password manager can come into its own.

    Read more

  • Image of London City Scene from the River
    4 Reasons Why Having a Managed Security Service Provider is Essential

    Security is an intrinsic part of running any organisation, from finance to education, sport to retail. Security is becoming increasingly complicated, and it won’t be getting less so any time soon. Here’s our take on why having a Managed Security Service Provider is Essential for your organisation.

    Read more

  • Top 9 IT Security Must-Haves for 2022
    The Top 9 IT Security Must-Haves for 2022

    The volume of attacks we are seeing is rising exponentially and getting more sophisticated with each year that goes by. Here are what we believe are the top 9 IT security must-haves right now.
    Read more

  • State of the Dark Web
    State of the Dark Web

    The dark web is a collection of internet sites that can only be accessed by using a specialist web browser. Here are some fast fact, key takeaways and actions you can take to protect your data.

    Read more

  • Infographic - 8 Steps to Cyber Security
    Infographic: 8 Steps to Cyber Security

    Cyber security threats are constantly evolving and security defences face an ongoing struggle to keep up. To highlight some of the key actions to take, we’ve created an infographic of the 8 Steps to Cyber Security.

    Read more

  • How to Secure Your School Against the Rise in Cyber Attacks
    How to Secure Your School Against the Rise in Cyber Attacks

    Cyber attacks against schools and colleges keep hitting the headlines. Bring cyber security to the forefront and secure your school.
    Read more

  • 4 Tips for Building a Positive Cyber Security Culture
    4 Tips for Building a Positive Cyber Security Culture

    Culture is about people. Building a healthy cyber security culture is about putting people at the centre of your structures and policies.

    Read more

  • Air Gapping and Your Recovery Strategy
    Air Gapping and Your Recovery Strategy

    Air gapping isn’t a new topic, and it goes by several different names, but it’s an interesting area and something it’s important to give a brief mention to. Air gapping is physically isolating a computer, network or device from any form of connected access – internet or LAN.

    Read more

  • Better Data Protection in Microsoft 365
    The Path to Better Data Protection in Microsoft 365

    Microsoft does not back up your Microsoft 365 data. To make copies of your data and store these securely, you need to devise a backup and recovery strategy, using a third-party solution. It’s time to get started on a path to better data protection.

    Read more

  • Phishing Simulation Testing
    Protect Against Human Error with Phishing Simulation Testing

    Phishing simulations test employees on how they would respond to a real-life phishing attack, without any compromise to data or risk to the organisation.

    Read more

  • The Journey to Zero Trust
    The Journey to Zero Trust

    ‘Zero trust’ is a relatively new buzzword in cybersecurity. As an evolving approach to network design, the term means many different things to many different people.

    Read more

  • Don't Get Phished, Get MFA
    Don’t Get Phished, Get MFA

    Phishing attempts are without a doubt increasing. While staff awareness is a great way to minimise phishing success, it only goes so far – sometimes you just need a more fool proof method.

    Read more

  • Most Common Cyber Attacks
    What are the Most Common Types of Cyber Attacks?

    There are several different types of cyber attacks out there, however some hit the headlines far more than others. We’ve put together a short snippet about the most popular, to explain a bit more about what they do.

    Read more

  • 5 Steps to Keep Your Information Secure
    5 Steps to Keep Your Information Secure

    Educating your staff on security awareness is essential to protecting your organisation. We’ve put together 5 steps to keep your information secure.

    Read more

  • Passwords Are Like Underwear
    Top Tips: Passwords Are Like Underwear

    An easy way to remember how to maintain safe and secure passwords is with the catchy phrase, ‘passwords are like underwear’.

    Read more

  • Increase Security Awareness
    Increase Staff Security Awareness

    One of the responsibilities of an employee is to help keep the organisation safe and protected from malicious activity. Here are our top tips to increase staff security awareness.

    Read more

  • Creating a Secure Password
    Top Tips: Creating a Secure Password

    ‘Create a secure password’. We’ve all heard it a hundred times by now, but what is the definition of ‘secure’ when it comes to creating a password?

    Read more

  • Oversharing Social Media
    Top Tips: Oversharing on Social Media

    Oversharing personally on social media is equal in sentiment to a business thinking they’re too small to be subject to a cyber attack. See our top tips on how to be mindful of what you’re sharing.

    Read more

  • Spotting Phishing Emails
    Top Tips for Spotting Phishing Emails

    Phishing emails come in all shapes and sizes and there’s no ‘one size fits all’ way to spot them. Here are our top tips on what to look out for.

    Read more

  • Windows 7 Going End of Life
    Windows 7 is Going End of Life

    You’ve probably heard talk about the Windows 7 operating system going ‘end of life’, but what does this really mean and how does it affect you and your business? Windows 7 is now in its final year of extended support, which will come to an end on 14th January 2020.

    Read more

  • Featured blog image of a sewing machine stitching on a patch
    What is Patch Management and Why Do You Need It?

    The technical term ‘Patching’, is as literal as it sounds: applying a patch to fix a problem, just as you would a tear in a pair of jeans.

    Read more

  • Protect Your Organisation from Your Employees
    Are you protecting your organisation from your employees?

    If you’re invested in the cyber security field you’ll likely have come across many an article discussing the risk employees pose to an organisation’s security – without even meaning to.

    Read more

  • Why You Need Multi-Factor Authentication
    Why You Need Multi-Factor Authentication

    The simple password as a security measure is no longer good enough for the world we live in today. The number of data breaches involving stolen or weak passwords has risen to 81%.

    Read more

  • Next Generation Firewall
    Traditional vs Next-Generation Firewall

    There is a new wave of enterprise firewall on the market, dubbed next-generation firewall (NGFW). A traditional firewall is usually defined as a device that is able to control the flow of traffic in and out of the network. These typically can only track traffic on layers 2-4. A NGFW can do far more than this. Although specific vendor offerings do differ, there are a selection of features which are generally seen as standard.

    Read more

COMPANY INFO

Registered Address & Head Office:

Martello House, Edward Road,
Eastbourne, East Sussex,
BN23 8AS

City:

5 Standard Place, London,
EC2A 3BE

UAE:

Al Neem Tower, Khalifa Street,
Suite 302, 3rd Floor,
P.O. Box 111022, Abu Dhabi, UAE.

Registered in England:

04843249

Terms & Conditions

Privacy Policy

How to be Forgotten

Sustainability Policy [pdf]

Modern Anti-Slavery Statement [pdf]

Accessibility Statement

SOLUTIONS

Managed Technology
Managed IT Support
Managed Security Suite
Technology for Education
Cyber Security for Education
Cloud Solutions
Connectivity Solutions
Unified Communications
Microsoft 365
Cyber Essentials
Endpoint Protection
Backup for Microsoft 365

ABOUT M-TECH

M-Tech Systems offer IT services, IT solutions and IT support to SMB, enterprise and education clients of all shapes and sizes.

We operate all across the UK, with special focus on Sussex, Kent, Surrey, Hampshire, Essex and London.

We can work in any way that suits you, either on a per project basis, alongside your existing team to bring additional expertise, or as fully outsourced IT support, providing a service desk.

CONTACT US

Tel:

+44 (0)1323 404040

Email:

info@mtechsystems.co.uk

CLIENT SUPPORT

mtech.support

Copyright 2022 © M-Tech Systems Ltd | All Rights Reserved | E&OE | Web Design by M-Tech Systems Ltd
  • Home
  • About
    • Partners & Accreditations
    • New Customer Referral Program
    • Join Our Team
  • Solutions
    • Managed Services
      • Managed Technology
      • Managed IT Support
      • Managed Security Suite
    • Education
      • Technology for Education
      • Cyber Security for Education
      • Microsoft 365 for Education
      • Microsoft Teams for Education
      • Google Classroom
      • Broadband for Education
      • Lightspeed Systems Solution Suite
      • Multi-Academy Trusts
      • Lenovo Tech 4 Learners
      • InVentry Sign-In Solutions
    • Cloud & Communications
      • Cloud Solutions
      • mtech.cloud
      • Unified Communications
      • Hosted Telephony
      • Social WiFi Marketing
    • Connectivity
      • M-Tech CloudConnect
      • M-Tech HyperConnect
      • Buyer’s Guide to Connectivity
      • Connectivity Solutions
    • Productivity Tools
      • Microsoft 365
      • Google Workspace
      • Microsoft Teams for Business
    • Cyber Essentials
    • Client | Server Solutions
      • Virtualisation
      • Microsoft Desktop Management
      • Apple Device Management
      • Nutanix
    • Storage
    • Security & Threat Management
      • Dark Web Monitoring
      • Multi-Factor Authentication
      • Endpoint Protection
      • Next Generation Firewalling
    • Availability & Disaster Recovery
      • Backup & DR
      • Backup for Microsoft Office 365
    • Audio Visual
  • Experience
    • Case Studies
    • Testimonials
  • News
  • Contact
M-Tech Systems