What was considered a tough approach a few years ago may now no longer be considered robust enough to fully protect your school or trust in the event of an attack.
While hybrid working has many upsides, it also comes with added risk from the increased dependence on technology. As hybrid working is now a normal working style, valid concerns have been raised around how secure this model is. We’ve detailed some of the vulnerable areas in this blog post.
It’s tempting to choose a single, memorable password and repeatedly use it, but this is one of the worst things to do. It is understandably very difficult to create unique passwords for the numerous accounts people have access to. This is where a password manager can come into its own.
Security is an intrinsic part of running any organisation, from finance to education, sport to retail. Security is becoming increasingly complicated, and it won’t be getting less so any time soon. Here’s our take on why having a Managed Security Service Provider is Essential for your organisation.
The volume of attacks we are seeing is rising exponentially and getting more sophisticated with each year that goes by. Here are what we believe are the top 9 IT security must-haves right now.
Read more
The dark web is a collection of internet sites that can only be accessed by using a specialist web browser. Here are some fast fact, key takeaways and actions you can take to protect your data.
Cyber security threats are constantly evolving and security defences face an ongoing struggle to keep up. To highlight some of the key actions to take, we’ve created an infographic of the 8 Steps to Cyber Security.
Cyber attacks against schools and colleges keep hitting the headlines. Bring cyber security to the forefront and secure your school.
Read more
Culture is about people. Building a healthy cyber security culture is about putting people at the centre of your structures and policies.
Air gapping isn’t a new topic, and it goes by several different names, but it’s an interesting area and something it’s important to give a brief mention to. Air gapping is physically isolating a computer, network or device from any form of connected access – internet or LAN.
Microsoft does not back up your Microsoft 365 data. To make copies of your data and store these securely, you need to devise a backup and recovery strategy, using a third-party solution. It’s time to get started on a path to better data protection.
Phishing simulations test employees on how they would respond to a real-life phishing attack, without any compromise to data or risk to the organisation.
‘Zero trust’ is a relatively new buzzword in cybersecurity. As an evolving approach to network design, the term means many different things to many different people.
Phishing attempts are without a doubt increasing. While staff awareness is a great way to minimise phishing success, it only goes so far – sometimes you just need a more fool proof method.
There are several different types of cyber attacks out there, however some hit the headlines far more than others. We’ve put together a short snippet about the most popular, to explain a bit more about what they do.
Educating your staff on security awareness is essential to protecting your organisation. We’ve put together 5 steps to keep your information secure.
An easy way to remember how to maintain safe and secure passwords is with the catchy phrase, ‘passwords are like underwear’.
One of the responsibilities of an employee is to help keep the organisation safe and protected from malicious activity. Here are our top tips to increase staff security awareness.
‘Create a secure password’. We’ve all heard it a hundred times by now, but what is the definition of ‘secure’ when it comes to creating a password?
Oversharing personally on social media is equal in sentiment to a business thinking they’re too small to be subject to a cyber attack. See our top tips on how to be mindful of what you’re sharing.
Phishing emails come in all shapes and sizes and there’s no ‘one size fits all’ way to spot them. Here are our top tips on what to look out for.
You’ve probably heard talk about the Windows 7 operating system going ‘end of life’, but what does this really mean and how does it affect you and your business? Windows 7 is now in its final year of extended support, which will come to an end on 14th January 2020.
The technical term ‘Patching’, is as literal as it sounds: applying a patch to fix a problem, just as you would a tear in a pair of jeans.
If you’re invested in the cyber security field you’ll likely have come across many an article discussing the risk employees pose to an organisation’s security – without even meaning to.
The simple password as a security measure is no longer good enough for the world we live in today. The number of data breaches involving stolen or weak passwords has risen to 81%.
There is a new wave of enterprise firewall on the market, dubbed next-generation firewall (NGFW). A traditional firewall is usually defined as a device that is able to control the flow of traffic in and out of the network. These typically can only track traffic on layers 2-4. A NGFW can do far more than this. Although specific vendor offerings do differ, there are a selection of features which are generally seen as standard.
M-Tech Systems offer IT services, IT solutions and IT support to SMB, enterprise and education clients of all shapes and sizes.
We operate all across the UK, with special focus on Sussex, Kent, Surrey, Hampshire, Essex and London.
We can work in any way that suits you, either on a per project basis, alongside your existing team to bring additional expertise, or as fully outsourced IT support, providing a service desk.