The WannaCry Cyber Attack has made worldwide news over the past few days. And as a Managed Service Provider with expertise in IT security, we have received a lot of questions about the details of the attack and what businesses can do to protect themselves. Below is our WannaCry cheat sheet, providing a quick overview of what happened.
This is a guest blog from Wendy Zamora at Malwarebytes, first published here.
Approximately one million people have had their Gmail account accessed by a phishing scam involving a Google Docs email yesterday.
It used to be that a good security system and a building with a manned gate kept businesses safe. Employees with key cards and CCTV surveillance were icing on the cake. Sensitive files were kept under lock and key in discrete locations, and security companies were hired to do drive-bys at night. We live in a whole new world though, and as BTA sees regularly, businesses need an entirely different type of defence to stay safe today. The latest research reveals that companies are still not addressing basic IT security issues, and cyber attacks are increasing faster than ever before. Companies, it would appear, are not fully understanding their vulnerabilities, or choosing not to do anything to address them.
If all your communications mediums work together seamlessly, you are more efficient. You can work more, and with less effort. This is why businesses are investing in unified communications technology. Luckily if you regularly use a Windows 10 PC and an Android phone or tablet, there are several free Android apps you can install that can seamlessly link the flow of information between the two, putting you firmly aboard the unified communications train, without any additional cost.
Most of us know how to do the basics in Microsoft Word—bold text, copy, paste, create bullet points and change font size. But few of us have ever been shown how to use Microsoft Word features that could make our documents that little bit more professional, or help us do things that little bit faster. Below our IT consultants give you their top 5 essential tips for Microsoft Word 2016 for a professional edge.
A few weeks ago, the world celebrated International Data Privacy Day. The goal of the day is to draw attention to all the personal information you own, and make sure it is secure as it can be. Most of us know to strengthen passwords and log out of sensitive accounts, but not many people know how to spot a fake app. And with apps for everything these days, knowing the difference between a real app and a fake app may prove to be a very useful skill indeed.
It is that time of year when many of us begin dreaming of, or indeed preparing for, a warm weather holiday. Short, dark days and constant drizzle is enough to make anyone reach for their passport. But before you decide to leave all technology behind for a complete break from your busy, gadget-filled life, check out the tech our IT experts think may help you to have a better trip.
You may have thought twice about the security of messages sent over WhatsApp, or about using an app for online banking. After all once you press ‘send’ or ‘transfer’, your data is in cyberspace, where theoretically anything could happen to it. Luckily, you need not worry. WhatsApp and major banking apps prevent unauthorised access to your data by 'scrambling' the information sent from one person to another into a lengthy code making it unreadable for anybody else attempting to access it.