-
-
-
-
0
-
-
-
Donna Aplin
What should I do about a data breach? GDPR came into force back in 2018 (on the 25th of May actually!). Data breaches were still ‘a thing’ before that of course, but the GDPR requirements mean that businesses need to do much better at protecting the personal data that they store about people. Of course, data breaches are still going to occur, in both small businesses and huge enterprises. If governments and massive, multi-national conglomerates can’t protect their networks 100% of the time, then of course small businesses in Sheffield and around the whole UK have a difficult job!
-
-
-
-
-
-
-
0
-
-
-
Jason Francis
Multi-factor authentication (MFA) is an important security measure for all businesses whether large or small. It adds an extra layer of protection to your login process by requiring users to provide two or more forms of identification before accessing sensitive information or systems. -
-
-
-
-
-
-
26
-
-
-
Donna Aplin
Cybersecurity insurance is still a pretty new concept for many SMBs. It was initially introduced in the 1990s to provide coverage for large enterprises. It covered things like data processing errors and online media.
Since that time, the policies for this type of liability coverage have changed. Today’s cyber insurance policies cover the typical costs of a data breach. Including remediating a malware infection or compromised account.
-
-
-
-
-
-
-
26
-
-
-
Matthew James
What are the best practices for password policies? Security Policies – and the eventual demise of the password
I did something unusual (for me) the other day – I went out for a drink in Sheffield city centre. Why does that matter to you? And why would I write about it here? Well it was while I was out mingling with actual real live people that a conversation arose about security and passwords (seriously, I’m an absolute blast when I am out on the town, honestly) and what the best policies are around passwords. It came to my attention that there are still a lot of people still following best practices from a decade ago…
-
-
-
-
-
-
-
26
-
-
-
Donna Aplin
The global home security market has been growing by leaps and bounds. By 2026, experts expect the market to expand at a rate of 20.1%. This is on top of an expected increase of 21.6% from 2021 to 2022.
-
-
-
-
-
-
-
26
-
-
-
Jason Francis
ESP Projects achieved this new designation in January 2023, meaning we are one of the first Microsoft Partners in Sheffield to gain the accreditation, showing our commitment to making sure that we are best placed to advise all our customers on all things Microsoft Cloud related. -
-
-
-
-
-
-
52
-
-
-
Donna Aplin
Who are the best IT Support Providers in Sheffield, Yorkshire? -
-
-
-
-
-
-
26
-
-
-
Donna Aplin
The new year has just begun and it’s a time of renewal as we plan for the possibilities to come in 2023. It’s also a time when you need to plan for resiliency in the face of ever-present cyberattacks.
Sixty-eight percent of surveyed business leaders feel that cybersecurity risks are getting worse. They have a good reason. Attacks continue to get more sophisticated. They are also often perpetrated by large criminal organizations. These criminal groups treat these attacks like a business.
-
-
-
-
-
-
-
0
-
-
-
Donna Aplin
One constant struggle in offices is the balance between productivity and security. If you give users too much freedom in your network, risk increases. But add too many security gates, and productivity can dwindle.
It’s a fine balance between the two, but one you can achieve. Organizations need to recognize the importance of both. And not sacrifice one for another.
-
-
-
-
-
-
-
26
-
-
-
Jason Francis
BT Openreach is intending to close off many copper connections by 2025. The idea is to bring consumers and businesses forward, into the SuperFast, UltraFast and HyperFast broadband spaces by forcing them onto Fibre based products. -
-
-
-
-
-
-
26
-
-
-
Jason Francis
IT Security in Sheffield from ESP Projects. You need to ensure that your business is better protected than most. Find out how here. -
-
-
-
-
-
-
0
-
-
-
Donna Aplin
It seems that nearly as long as passwords have been around, they’ve been a major source of security concern. Eighty-one percent of security incidents happen due to stolen or weak passwords. Additionally, employees continue to neglect the basics of good cyber hygiene.
-
-
-
-
-
-
-
0
-
-
-
Donna Aplin
Bring your own device (BYOD) is a concept that took hold after the invention of the smartphone. When phones got smarter, software developers began creating apps for those phones. Over time, mobile device use has overtaken desktop use at work.
According to Microsoft, mobile devices make up about 60% of the endpoints in a company network. They also handle about 80% of the workload. But they’re often neglected when it comes to strong cybersecurity measures.
-
-
-
-
-
-
-
26
-
-
-
Donna Aplin
Firstly, what is the duck and where did it come from? Well, we decided that we should have a pet, here at ESP Headquarters. Unfortunately, we’re always very busy delivering best in class IT Services to businesses in and around the Sheffield area to be able to look after a real-life one properly. So, we decided that we should pick one that is a little more simple in the effort stakes (no need to feed or walk!).
-
-
-
-
-
-
-
0
-
-
-
Donna Aplin
Microsoft Teams is a lot of things. It’s a video conferencing tool, a team messaging channel, and a tool for in-app co-authoring, just to name a few. During the pandemic, the popularity of Teams skyrocketed.
User numbers for MS Teams jumped from 20 million in November 2019 to 75 million in April 2020. As of this year, Microsoft reports a user count of 270 million for the platform. This makes it the most popular business tool for team communications.
-
-
-
-
-
-
-
26
-
-
-
Donna Aplin
Have you ever bought a new computer and then had buyer’s remorse a few months later? Maybe you didn’t pay attention to the storage capacity and ran out of space. Or you may have glossed over memory and experienced constant freeze-ups.
An investment in a new PC isn’t something you want to do lightly. Doing your research ahead of time and consulting with a trusted friend or IT shop can help. It will keep you from making major mistakes that could come back to haunt you later.
-
-
-
-
-
-
-
0
-
-
-
Donna Aplin
Endpoints make up much of a company’s network and IT infrastructure. This is a collection of computers, mobile devices, servers, and smart gadgets. As well as other IoT devices that all connect to the company network.
The number of endpoints a company has will vary by business size. Companies with less than 50 employees have about 22 endpoints. Small businesses with 50-100 employees have roughly 114. Enterprise organizations with 1,000+ employees average 1,920 endpoints.
-
-
-
-
-
-
-
0
-
-
-
Donna Aplin
One of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection.
Because insiders have authorized system access, they bypass certain security defenses. Such as those designed to keep intruders out. Since a logged-in user isn’t seen as an intruder, those security protections aren’t triggered.
-
-
-
-
-
-
-
26
-
-
-
Donna Aplin
Data entry can be a real drag for salespeople. The time they spend on administrative tasks is time away from customer interactions. But that data is vital.
It’s important to capture customer orders, quotes, needs, and more. Lead and sales reporting help sales managers know where to direct their attention. Analytics also help drive more efficient ways of closing the deal.
-
-
-
-
-
-
-
26
-
-
-
ESP Projects
Surface Pro 9 gives you the tablet flexibility you want and the laptop performance and battery life you need to move through your day — all in one ultra-portable device. -
-