We regularly talk about cyber-security and the need to make sure your systems secure.
If you’ve ever had a major IT outage in your business or accidentally deleted a file, you’ll know how vital an IT backup system is.
BYOD (Bring your own device) is not a new phrase in the IT world. Since the inception of the smartphone, many companies offer their employee’s the option to use their personal phone for work related purposes.
As you may already be aware (and you can see from the count-down timer at the top of our website), Microsoft are ending support for many of their legacy pieces of software, including Microsoft Windows 7, Office Suite 2010, SQL 2008 and Server Standard 2008.
One of the weakest points in any security system, whether it be an IT system, or other system, is usually the human operators of that system. There is a whole subset of “hacking Techniques” dubbed “social engineering” where the goal is not to find weaknesses in the technological level of the system, it is to glean information from the end users to enable increased access, or to trick the end user into performing some task on their behalf, we have covered a couple of the methods used here and there.
Over the last week or so we have noticed an increase in Phishing Emails designed to illicit the Office 365 account details from unsuspecting end users. Unfortunately we have seen a couple of end users fall for these and have allowed access to their email system to an outside agent. with these details the Phisher can do anything that you would be able to do with your emails.