Date:

Author

Category: Data Backup, IT News, IT Security, IT Support.

World-Backup-Day-Logo

What would you do if you lost everything?

That’s the question being posed on World Backup Day 2015; a global movement to emphasise the importance of keeping a second copy of all your important files.

For our customers, every day is World Backup Day – as you would expect when your IT is in the safe hands of an award-winning official Microsoft SME Cloud Partner.

But for those who don’t have this contingency strategy in place, this is a great opportunity to evaluate:

  • Which files are crucial to the successful continuity (and let’s face it – profitability) of your service provision?
  • What are you already doing about backing them up now, and
  • What should you be doing to minimise the irreversible damage that occurs when your hard drive fails?

If your data isn’t backed up, once it’s gone it’s gone, and losing your files is way more common than you’d think. One small accident or failure could destroy all the important information your business and livelihood depends on.

In fact, research has shown that 60% of companies that lose their data will shut down within six months of the disaster whilst 93% of companies that lost their data for 10 days or more due to a disaster filed for bankruptcy within one year of the disaster. (Source: National Archives & Records Administration).

The good news is backing up is straight-forward once you’ve set up the backup process. There are a number of different methods – depending on how you want to backup your data and how safe you want to keep it. It’s just a matter of taking the first step of recognising the value of your data.

For more information download our free leaflet on backup advice or fill in the contact form to find out how we can help you manage your backups.

Date:

Author

Category: Cloud Computing, IT Security, IT Support.

Computer-Virus-2

93% of companies who lose data for more than 10 days file for bankruptcy less than a year later.*

This could be the sobering reality you face if you don’t take responsible, proactive steps in order to defend your livelihood against hacking and other forms of cyber-crime.

Beyond putting the right technology in the right place, let’s look at how you can mitigate against…

Phishing Emails

Promising special offers or making false claims about bank statements or tax records, phishing emails typically tempt between 60 and 90% of employees to ‘click here’, which can have catastrophic consequences for your business.

Action you can take:

  • Teach your employees to be vigilant for bogus emails and not to click anything they do not fully trust – banks do not send emails asking people to verify login details!
  • Carry out regular phishing assessments or “cyber-attack drills” by regularly exposing your staff to various realistic attacks but in a controlled environment.
  • Have in place a process to report phishing emails and who to notify in case they’re clicked purposely or by error; ideally to be carried out within 15 minutes.

Data Thieves

Encrypting your data ensures that if someone were to get their hands on your computer, they wouldn’t be able to easily access your files or get hold of your personal data.

Action you can take:

  • On certain versions of Windows encryption is a pretty simple process and on other systems there is software available to enable this.
  • Ensure all of your files including documents, photos, music, bookmarks and anything else you may need are backed up and readily available in case you become “locked-out” and are no longer able to access them on your computer.

Password Hackers

Last year ‘123456’ headed up a list of the 25 most common passwords. Choosing a password like this is the IT equivalent of putting out a welcome mat and leaving your key in the front door. Strong passwords are at least 8 characters long (longer is better!) and contain a combination of numbers, symbols and letters.

Actions you can take:

  • Don’t use the company name or even the name of the program you are using (e.g. Photoshop123).
  • Don’t keep your carefully-chosen words the same for all accounts. Think of something memorable but with different variations for each, and store them away from your PC.

Network Infiltrators

Free Wi-Fi or other kinds of wireless or shared networks in places like coffee shops, hotels, conference rooms and on public transport can be used by anyone – making them the perfect hunting ground for hackers.

Actions you can take:

  • Read the Terms and Conditions of wireless networks before logging on.
  • Think ‘safety first’ and turn on all the security protection open to you.
  • Don’t login to sensitive sites (such as your online banking) when using a public wireless network

Virus Spreaders

‘Code Red’, ‘Slammer’, ‘MyDoom’… Viruses so infamous they’re classed as the most destructive of all time. Specific viruses come and go but the key to surviving them all is the same – be vigilant. Protect yourself and your assets.

Actions you can take:

  • Keep your internet security software up-to-date and switched on at all times.
  • Apply the latest Microsoft updates to your Windows operating system as soon as possible
  • Install and apply the latest manufacturers’ updates for all your software programs.
  • Trust your gut. If an attachment, email or website doesn’t feel safe, it most likely isn’t.

The PC Support Group provides expert advice on all matters relating to cybersecurity. Contact us on 03300 886 116 to discuss your IT strategy, and how we can bring our world-class managed service provider benefits to your organisation.

*Source: National Archives & Records Administration in Washington

 

Spam Detection in Emails

Date:

Author

Category: Business, IT Processes, IT Purchasing, IT Security, IT Training.

If you’re in the habit of checking the news online you will have noticed that almost daily now there are reports of data breaches by attackers. Cyber security headlines are all too frequent and alert us to the skill and persistence of hackers.

Many organisations still rely on traditional security controls in the form of technology such as anti-virus software and firewalls, etc. to protect their critical assets but it is now clear that this is not enough. The increasing importance of employee security awareness is often overlooked with companies providing little or no basic awareness training.

Personnel and processes are often disregarded when it comes to improving security, partly because the security risk they pose to an organisation is difficult to measure and track.

These days, this a crucial issue with cyber security, but businesses that (very sensibly) put in place IT software security often struggle to get senior management to address a risk that they haven’t been able to quantify, or even prove exists.

The problem is that as the technical, on-line security of organisations increases, attackers are looking instead to a much weaker area: employees.

Read more »

Spam Emails

Date:

Author

Category: Data Backup, IT News, IT Security.

New research suggests that cyber-crime costs small businesses around £800 million a year.

Not only that, but you have a responsibility to put adequate measures in place – if not, you could face fines of as much as £500,000 for cyber breach and data loss under current legislation. Other threats include: social media misuse, hacking, and loss of company devices.

As many as 60 per cent of small firms reported security issues last year, with major breaches costing a small firm on average between £65,000 and £115,000.

Here, we’ve created a useful checklist to help you assess whether you are helping reduce the chances of the worst happening to your business.

How many of the following questions can you answer “YES” to?

Read more »

Cyber Attack Prevention

Date:

Author

Category: IT News, IT Security, IT Support, Latest.

The National Crime Agency have announced that online users have two weeks to prepare for a “powerful cyber attack”. Two pieces of malware software known as GOZeuS and CryptoLocker are at the centre of this alert and are reported to be responsible for hundreds of millions of pounds of fraud globally.

At The PC Support Group, we’re putting together an action plan to best protect our customers

All computer users are being warned to ensure their security software and operating system are both up to date, and to run scans to check for any problems. Important files should also be backed up.

Read more »

Child Internet Addict

Date:

Author

Category: IT News, IT Security.

According to new research, over a third of young people believe they are addicted to the internet.

The poll, carried out on behalf of Tablets for Schools, a charity that campaigns for the increased use of tablet type devices in education, unearthed some shocking statistics on how much today’s young people actually rely on devices that allow them to access the web.

One 12-year-old who was interviewed as part of the survey said: “The internet nearly always controls my actions.

“I have been told that I am addicted to the internet, and prefer its company rather than being with other people. I feel lost without the internet.”

Being addicted to the internet at a young age can have dangerous consequences with potential exposure to cyber bullying, violent and pornographic content.

So how can you tell if you’re child – or a young person you know – is addicted? Here are five things to look out for:

Read more »

Heartbleed Bug

Date:

Author

Category: IT Security, Latest.

If some of the headlines from the past week or so are to be believed, all our email accounts and social network sites are easy targets and the information about us they contain are just waiting to be hacked to within an inch of their lives at any time with little anyone can do about it.

But don’t panic just yet. It might not be as bad as you think.

So before you start saying Farewell to Facebook or “ta-ra” to Twitter, here’s a little more information about the Heartbleed bug, what it does, how it works and how you might be able to fight it.

1. What is the Heartbleed Bug?

Basically, the Heartbleed bug allows anyone on the internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. It’s official name is CVE-2014-0160 and allows an attack to read information from a web server even when it’s supposed to be secured against intrusion. The bug affects an OpenSSL extension known as “heartbeat” which makes it possible to keep a secure communication channel open without re-negotiating security protocols.

Read more »

Computer Virus

Date:

Author

Category: IT News, IT Security, IT Support.

The PC Support Group has issued a warning to all computer users about a type of computer virus attack which appears to be affecting an increased number of systems in recent weeks.

This relatively new type of malware is capable of bypassing anti-virus/anti-malware protection by changing its appearance, and until anti-malware software is made aware of the new ‘strain’ it isn’t able to block it.  This process can take hours from when the virus is released and as a consequence there is a window of time where systems are particularly exposed and vulnerable to attack.

Read more »

File Recovery

Date:

Author

Category: Business, IT Security, IT Support.

Keeping computers up and running is a fundamental requirement for any business.

Companies are starting to recognise the importance of having good data backup processes but this is only part of the picture. If there is a major incident, how quickly can the backed up data be restored to provide operational systems again? Many small businesses don’t know, and most lack an effective IT Recovery Strategy.

Whether you are a sole trader or running a business with thousands of customers, system failure can result in loss of crucial data, time, money and clients.

There are 4 main points to consider:

  1. Location – where can you continue to operate if you are unable to gain access to your regular office or if it is destroyed?
  2. Data – have you backed up your data to a safe place?
  3. Equipment – how quickly can you obtain new hardware on which to run your systems?
  4. Configuration – how quickly can the systems be set up again and who will do this?

Read more »

Backup Button

Date:

Author

Category: IT Security, IT Support.

If there’s one important task computer users regularly ignore, it’s backing up their data. The data on your hard drive is the most critical and valuable item inside your computer (far more important than the hardware itself), and can’t be easily replaced if lost.

The files on your computer are very fragile. They can be destroyed or damaged by a software malfunction, viruses, Trojan worms, physical damage (such as dropping a laptop)
One of the biggest reasons people neglect backing up is that they don’t know where to start, what tools to use, or how to go about it. They also think it’s going to take a lot of time, cost and effort. and user error.

There are a lot of different options out there, all with their own merits. Here are just a few of the options that are open to you.

Read more »