• IT Support Provider letting you down?

    There is a better way...

    Request a Quote
  • Head in the Cloud? Let us clear the path to a brighter IT future for your business.

    Call us on 01268 575300 for more information

    Request a Quote
  • Due for an IT systems upgrade or rethink? We can offer solutions for every budget.

    Call us on 01268 575300 to find out more

    Request a Quote

Microsoft releases enhanced protections for ransomware aimed at small businesses

blog 45 - microsoft releases enhanced protections for ransomware aimed at small businessesIn the face of growing danger from cyber threats such as ransomware and phishing, Microsoft have released an upgraded set of features for their Microsoft 365 business edition in the hopes of safeguarding small businesses.

Microsoft has said that Microsoft 365 Business will now include sophisticated scanning of attachments and AI-powered analysis to uncover and destroy malicious messages. The updates also include automatic checking of links in emails and full device protection to prevent devices from accessing ransomware and other suspicious web locations.

British businesses warned to stay vigilant in the face of Ransomware attacks

british businesses warned to stay vigilant in the face of ransomware attacksA new report from security watchdog SonicWall has confirmed that the threat of Ransomware is greater than ever in the UK and that British businesses in particular should sit up and take note, with over 38 attacks every day on UK based companies and organisations.

What is Ransomware?

Ransomware is a form of malware which locks away a victim’s files and then requests payment to have them returned. Ransoms are paid through a digital currency such as Bitcoin, which allows for highly encrypted and anonymous transactions. While a ransomware attack can be a nuisance for individual computer users, for businesses the repercussions can be far greater. A loss of sensitive data, particularly that of clients and customers can lead to serious damage to reputation and financial losses. In order to protect themselves from Ransomware, businesses should work closely with IT security specialists to ensure that systems are updated with the latest software, patches and firewalls and that they have access to offline backups of their data should the worst happen, and they fall victim to a ransomware attack.

Nearly half of all global login attempts are made by hackers

nearly half of all global login attempts are made by hackersThe content delivery network Akamai has claimed that 43% of all online login attempts are performed by cyber criminals attempting to compromise accounts of businesses and corporations.

A recent report from Akamai has revealed that almost half of all online log in attempts are “malicious”. In its report ‘Q4 2017 State of the Internet/Security report’ the company provided research that claims an overwhelming number of log in requests are “attempts to log in to an account using password guessing software or account details gathered from elsewhere on the internet. However, other sources such as The Register have suggested the real figure could be even higher.

Apple confirms security flaw in almost all its products

ecl blog 42Tech giant Apple has confirmed two major bugs found across almost all of it’s devices including iPhones, Macbook Pro’s, iMac Pro’s, Macbook’s, iMacs and iPad devices.

Apple has said the two issues known as “spectre” and “meltdown” are believed to affect “nearly all computing devices and operating systems” with only the Apple watches believed to be immune.

Meltdown is said to affect Intel processors, which are commonly found in Macs. It could in theory allow malicious software or hackers to overcome the system’s security protection to send or see specific application data. Spectre, on the other hand, is a bug that affects not only Intel but also ARM and AMD systems and processors found in iOS devices. This could make devices vulnerable by making it easier to access highly valuable information such as passwords, data and communications previously protected by encryption.

Keyloggers found on HP laptops

ECL blog 41Recently we wrote about the dangers of keyloggers, a dangerous piece of software that can track everything you type in to your keyboard.

The seriousness of the threat posted by keyloggers has been highlighted today in a report by security researcher Michael Myng. The report, which can be viewed here, found that hidden keylogger software was pre-installed on the systems of hundreds of HP laptop models.

According to the report, as many as 460 models of HP laptops had been found to contain keyloggers including EliteBook, ProBook, Pavillion and Envy ranges dating back to 2012.

Is it time for you to outsource your IT support?

ECL blog 40Every business will at some point encounter IT problems. Not only do businesses need to maintain systems that work swiftly and accurately, but they also need to make sure that they are safe and secure from cyber threats.

To keep things moving, it is important to have someone on hand to help. Let’s look at some of the reasons why you should work with a trusted IT support company.

The cost factor
While in the early stages of your business it can be realistic to manage some aspects of IT yourself, there comes a point when it is no longer profitable to do so. If you want your business to grow then you need to have your attention focused on, well, your business. If you’re spending too much time on working out problems with emails, updating software or guarding against security issues then you should consider asking for help to bring back some balance to your day.

KRACK Attack: How safe is your WiFi connection?

KRACK attack how safe is your internet connectionA disturbing flaw in Wi-Fi networks has allowed for hackers to eavesdrop on data being passed through most modern Wi-Fi networks. This means that any device, from laptops and mobile phones to games consoles and tablets, could all be vulnerable to hacking with credit card numbers, passwords, chat messages and emails all potentially under threat.

Known as a key reinstallation attack or KRACK for short, this newly discovered flaw was unearthed by Marty Vanhoef, a Belgian researcher. What’s more, the researcher claims that the problem is not limited to any one device or operating system and instead is an issue with Wi-Fi as a whole.