tag:blogger.com,1999:blog-79346897221343454812024-03-04T20:43:28.163-08:00BlogECLhttp://www.blogger.com/profile/05441693925955384687noreply@blogger.comBlogger70125tag:blogger.com,1999:blog-7934689722134345481.post-10363548147218958442020-05-29T06:14:00.001-07:002020-05-29T06:14:55.841-07:00The Importance of Zero Trust Network Security<p><img width="350" height="233" title="Zero Trust Network" align="right" style="margin: 0px 0px 10px 10px; border: 0px currentcolor; border-image: none; float: right; display: inline; background-image: none;" alt="Zero Trust Network" src="https://drive.google.com/uc?id=1fL79pH84dzk7yem6pYbqRlInhWTdGRwE" border="0">Zero trust network security is an alternative IT security model with the main principle being “never trust, always verify” which is being adopted by many companies to improve their cybersecurity. Here we discuss the importance of zero-trust network security. </p>
<p><strong>What is Zero Trust Network Security?</strong> </p>
<p>This model has a strict identity verification for each person and device trying to access business resources from a company network, is regardless of whether they are working from home or at the office.</p><a name='more'></a><p>Older security models were based on the castle- and- moat concept. This meant that it was difficult to penetrate the network from the outside, however, anyone within the perimeter of the network was automatically trusted. Issues potential arise with cyber threats, globalisation and user mobility which meant these more conventional methods were not robust enough. For example, if an attacker managed to gain access to the network, they would immediately have access to all the data. </p>
<p>The more traditional methods are also outdated with the rise of mobile working. Now that information is rarely kept in one place and is often spread across cloud vendors, it is more difficult to have a single security control for the entire network, making zero-trust the more secure option. </p>
<p>With zero-trust network security, as the name suggests, no one is trusted by default and verification is always required from anyone trying to gain access to the network. </p>
<p>There are several elements and principles that make up a zero-trust network. Here we discuss some of them. </p>
<p><strong>Least Privilege access </strong> </p>
<p>Least privilege access is another principle of zero-trust security. It involves giving users only as much access as they need. If they do not need certain data or network access to carry out their day to day job then they will not be able to automatically access this. This principle reduces the exposure of sensitive company information which is vitally important. </p>
<p><strong>Microsegmentation </strong> </p>
<p>Microsegmentation is the process of breaking up security perimeters into small sections to separate access for different parts of the network. </p>
<p><strong>Multi-Factor Authentication </strong> </p>
<p>Another core value is Multi-factor authentication (MFA). This means that a user needs to provide an additional piece of information/evidence to authenticate a user. In addition to entering a password, a user will have to provide another piece of information. For example, a code can be sent to another device such as a mobile phone. This adds another layer of security and helps provide evidence that the user is who they claim to be. </p>
<p>Zero-trust network security ensures policy enforcement and protection for all users, devices, applications and data, regardless of where they’re connecting from. This is invaluable for those businesses who have employees working from home or other locations outside of the office. This user-centric approach means that verification is mandatory, not optional. </p>
<p><strong>Benefits of Zero Trust Security </strong> </p>
<p>There are many benefits to adopting zero-trust security principles. Not only does it provide a business with control and the ability to reduce the risk of targeted, but it can also help mitigate data loss, increases the ability for businesses to work from several locations, increases security over sensitive data and suits the new way of working remotely. </p>
<p><strong>What Next? </strong> </p>
<p>It is now relatively easy for a business to start implementing a zero-trust security network. Packages such as Office 365 facilitate this and allows companies peace of mind that there are additional layers to their security, that employees can work remotely whilst remaining secure and limit the access that only people need to carry out their job efficiently. </p>ECLhttp://www.blogger.com/profile/05441693925955384687noreply@blogger.com0tag:blogger.com,1999:blog-7934689722134345481.post-48224961736604296212020-04-28T08:20:00.000-07:002020-05-04T08:20:41.789-07:00Five Misconceptions of Cloud Computing<p><img width="350" height="233" title="Misconceptions of Cloud Computing" align="right" style="margin: 0px 0px 10px 30px; border: 0px currentcolor; border-image: none; float: right; display: inline; background-image: none;" alt="Misconceptions of Cloud Computing" src="https://drive.google.com/uc?id=19jNaNLMZrbO0S01TMdv7gs793FcmOqiB" border="0">The cloud is consistently growing with many public and private sector companies using it in some form or another. Whilst some may see it as a way to solve all of their IT issues, others find it a source of worry. As with many new technologies, there are sometimes myths and inaccurate information being spread about them. Here are some of the top misconceptions of cloud computing. </p>
<p><strong>The cloud will guarantee money-saving on IT</strong> <br>Although cloud computing is a great and effective way to reduce costs, a company needs to bear in mind that this will not happen instantly. <br>
Cloud computing offers flexible options based on your budget. However, a business should not focus on cost alone. The cloud enables a company to quickly adjust the computer power they need which is extremely useful if the team gets smaller, as you do not have excessive computer capacity that is being wasted. </p><a name='more'></a><p><br>
Although switching to the cloud gives companies the flexibility to adjust it to their budget, they need to consider the additional investment to train staff to use the technology correctly. Once all staff are well versed in the new way of working, cost reduction can eventually be seen. Especially if cloud computing reduces the time it takes for certain jobs to be carried out. This time saving can quickly add up and make a big financial saving. Companies may also have to invest in better broadband services, ideally multiple services because if the broadband goes down, they will lose access to their data. Cloud services also generally require a fast, reliable fibre broadband to run efficiently.<br><br>
When you add up the costs of IT management, energy consumption, hardware, software licensing, storage space, and more, it is clear to see the financial benefits in the long term for switching over to the cloud. <br><br><strong>
Cloud computing is not secure</strong> <br>
A major concern of many companies, and rightly so, is cybersecurity. Privacy is high on the priorities for many companies and some believe that cloud computing places this privacy at risk. However, this is not the case. Providers are actually building security mechanisms to guarantee that even themselves cannot access the data to provide customers with peace of mind. Cloud security is improving all the time and in most cases, cloud vendors will have data encryption and security procedures in place that are much more advanced than those that clients will have in-house. Cloud computing allows companies of all sizes benefit from the experienced staff that takes care of updating and improve their security measures. <br><br>
Using the cloud does not automatically mean your data is backed up. It is often the responsibility of the end user to ensure data is backed up. However, smaller companies will still find cloud computing more secure. Whereas before they would not have been able to afford an IT department, cloud technology means that can benefit from a wealth of expertise without paying them a salary. <br><br><strong>
There is a one size fits all approach to Cloud computing</strong> <br>
Businesses should not think of cloud services as “one thing”. A great benefit of cloud technology is the fact that it is flexible and can accommodate the different business needs of all businesses, regardless of their size. <br><br>
Cloud technology is modular, meaning that companies will only pay for what they use which gives them greater control and offers the ability to scale up and down when needed, depending on the business’ current needs. <br><br>
It is also important for businesses to know that although cloud computing is extremely flexible, companies do not need to use cloud computing for everything. Cloud computing is not an either-or thing. Not all systems are compatible with every cloud vendor, so businesses need to consider carefully which aspects are best suited to the cloud and which aspects may not be. <br><br><strong>
Cloud computing improves business productivity</strong> <br>
This misconception is a bit more complicated to address. Although using the cloud definitely has the potential to enhance business productivity, this improvement will not happen automatically. Once a business has moved over to cloud computing, they need to ensure that all members of staff are trained properly to effectively use this tool. Once this happens, better collaboration can take place and this is when companies will see an improvement in business productivity. But it can take time. Businesses must provide the support and additional applications necessary for employees to successfully do their job and ensure the transition is smooth. <br><br><strong>
Cloud computing gives you less control</strong> <br>
This is not true. Businesses will get more control as cloud computing allows access to data at any time and from anywhere in the world. Some believe that because they cannot see where their data is being stored, this means they will have less control but this is not the case. Having stored in the cloud gives businesses access to it whenever they need it as long as they have a good enough internet connection. All without the hassle of having to maintain it, as this is done for them by the cloud vendor, <br><br>
As you can see, there are various misconceptions surrounding cloud computing technology. It is important for these misconceptions to be addressed head-on so that businesses are clear on how cloud computing can successfully work for them, can embrace using cloud computing and the innovative technology is brings along with it to enable businesses to get the maximum value out of it. </p>ECLhttp://www.blogger.com/profile/05441693925955384687noreply@blogger.com0tag:blogger.com,1999:blog-7934689722134345481.post-51245598104326848492020-03-30T03:40:00.000-07:002020-04-07T03:40:20.861-07:00How Hosted Exchange Benefits Businesses<p><a href="https://drive.google.com/uc?id=1O9VB8BfKq5VVmgacT59OpBf3tqEzEvBh"><img width="350" height="213" title="" align="right" style="margin: 0px 0px 10px 30px; border: 0px currentcolor; border-image: none; float: right; display: inline; background-image: none;" alt="Hosted Exchange" src="https://drive.google.com/uc?id=1bNWOTGE4IleJYM5IVz-KY1kXfhsKlVLo" border="0"><br></a><p>For the majority of small and medium companies, email is essential to the everyday running of the organization. As email is such a critical business tool, it not only has to be fast and reliable, but it also needs to be able to be accessed remotely. Having this flexibility allows staff to always be in touch with the business. Although managing your email infrastructure in-house is definitely achievable, this method can be both time-intensive and expensive. Luckily, there are hosted exchange options available that allow businesses to outsource their emails to help streamline their business. Here, we discuss in more detail how hosted exchange can benefit businesses.<br><br><a name='more'></a><p><p>Hosted exchange is offered by companies such as Microsoft. When combined with Microsoft Outlook, the service offers remote and mobile email access in a secure and private way. Also known as Software as a Service (SaaS), hosted exchange services are software applications that staff access via the internet. Hosting vendors store the information on their own servers, and will manage the entire system on behalf of the company. This saves companies time and energy having to keep their email service up to date in house.<p>Here are some of the key benefits for businesses to using Hosted Exchange:<p><b>Scalability</b><p>Scaling an email infrastructure in-house can require purchasing additional server hardware and software, both of which are costly. Hosted exchange users however can easily avoid these costs by simply adding as many additional email mailboxes as they require.<p><b>Increased Productivity</b><p>With the ability to share calendars and have access to emails on the go, hosted exchanged services have allowed workforces to be a lot more productive. <p><b>Low-Cost</b><p>The cost of having a fully functioning hosted exchange mailbox does not come at a large expense. Usually, a small monthly fee is all it costs, which is great for streamlining cash flow. Studies have shown that the ROI of hosted exchange services is high. There is no need to invest in infrastructure, hardware or licensing of Outlook or anti-virus software. This means you can start seeing the return on investment almost immediately. Many hosted exchange services use a pay-as-you-go subscription model, meaning that businesses only pay for what they need. If new staff start, their services can easily be expanded to accommodate them. The same will apply when someone leaves the company.<p><b>Limited Downtime</b><p>There is nothing as frustrating as when your email access is down. An email outage can halt productivity and cause a myriad of other issues. Hosted Exchange providers design their networks specifically in order to keep email downtime to a minimum. This reassurance that email access will always be available is a great comfort to business owners.<p><b>Security</b><p>In this day and age, cyber-security is of the upmost importance. The security measurements in place with a hosted exchange service are a lot more robust than local security measures. This gives peace of mind that businesses can know that their data is sufficiently protected. Hosted Exchange services usually come with anti-spam and anti-virus protection built in. This can help reduce spam people and will screen for any potential online threats.<p><b>Access to Support</b><p>Outsourcing your email allows you to access support remotely. This frees up your internal IT team to work on other projects. The service provider will also always provide updates when necessary.<p><b>Frees up IT resources</b><p>A hosted exchange will free up the precious time available to in-house IT staff. Without them having to spend time on the day-to-day maintenance, they can invest that time and their expertise in other areas of the business that will benefit the business long-term.<p>It is important that owners of small and medium companies spend their time focusing on growing the business and growing their bottom line rather than having to worry about whether their email is working correctly. Investing in hosted exchange gives business owners peace of mind that their email infrastructure is robust, secure and reliable. Hosted services have allowed smaller companies access to these amazing benefits which previously would have only been available to larger organisations.ECLhttp://www.blogger.com/profile/05441693925955384687noreply@blogger.com0tag:blogger.com,1999:blog-7934689722134345481.post-37185665288596914982020-02-28T08:55:00.001-08:002020-02-28T08:55:51.519-08:00How Cloud Computing Can Save Your Business Money<p><img width="350" height="209" title="Cloud computing symbol being pressed by hand" align="right" style="margin: 0px 0px 10px 10px; border: 0px currentcolor; border-image: none; float: right; display: inline; background-image: none;" alt="Cloud computing symbol being pressed by hand" src="https://drive.google.com/uc?id=1K5CDzXx0AMPJXpHispdHKsSTYq9lZyBC" border="0">Cloud computing has brought new and exciting opportunities for companies of all sizes. Small and medium-sized companies have seen benefits as the flexible technology allows them to compete on a global scale. They can now utilize technologies that were previously too expensive. Not only does cloud computing provide storage, software solutions and technology infrastructure, it can also help businesses minimise their costs. <br><br>
Here we discuss 5 ways that cloud computing can help your business save money. </p><a name='more'></a><p><br><br><strong>
No need to buy servers<br></strong><br>
Previously, businesses needed to buy servers on which to run the certain business applications. This had to be managed internally causing a large investment in human resources. It also involved a substantial financial investment upfront and therefore made the software out of reach for small businesses.<br><br>
Cloud computing gives access to some of the most powerful software solutions and infrastructure without the need to buy servers. Having applications streamed from the internet means small businesses can benefit from them, regardless of location.<br><br>
This pay as you go style also avoids the need to invest in high-cost hardware which can boost your cash flow. <br><br><strong>
Flexibility</strong> <br><br>
A major benefit to cloud computing is the flexibility and scalability it provides. With cloud computing, an IT administrator can simply log in to a software platform to manage licenses and user which saves a lot of time and investment. <br><br>
Also, if you find yourself with a smaller workforce due to demand, you can simply amend your service plan with cloud computing, saving you money.<br><br><strong>
Staff Savings</strong> <br><br>
The beauty of cloud computing is that it has provided many employees the opportunity to work remotely. Online storage platforms store company data. This means all the documents needed to carry out many jobs are accessible from anywhere and on any device. People are no longer restricted to working in an office. This can benefit both the employees who want flexibility but also employers. By offering flexible working perks to improve employees work-life balance, it can really motivate staff and boost productivity. It can also save money as some workers would happily sacrifice some of their salary if it meant they could work from home.<br><br>
You also no longer need an in-house team of IT specialists to install, update and maintain all the software and servers or run backups. Paying a small monthly fee to your cloud computing provider instead eradicates the need for internal teams.<br><br><strong>
Updates are provided automatically</strong> <br><br>
With cloud computing, you do not have to worry about updating the software as the provider will do regular updates on your behalf. This saves you from having to worry about spending time maintaining the system yourself. This frees up precious time to focus on other areas of the business.<br><br><strong>
Backup and Disaster Recovery<br></strong><br>
Setting up a comprehensive Disaster recovery Solution internally can be a mammoth task. It could also take a lot of time and money to get the process right. The financial and effort outlay can be difficult for small businesses that sometimes lack both resources. A power cut or a data failure could be disastrous for a small company without a solid DR solution.<br><br>
Cloud computing solution offer simple and effective DR solutions for most sizes of business and perform routine checks and backups for you. This provides peace of mind that data is accessible in an emergency and that it remains as safe as possible in the first place.<br><br><strong>
How ECL can help!</strong><br>
These are just a few of many reasons why cloud computing can benefit small businesses and help them save money. We have the ECL Private Cloud which is our own state of the art hosting platform and is perfect for small to medium sized businesses. If you are looking for a fully Hosted IT infrastructure, a Disaster Recovery plan, or just a basic on-line backup service, we can help. For further information on how your business can benefit from everything the cloud has to offer, visit <a href="https://www.computer-support-essex.co.uk/ecl-private-cloud.html">https://www.computer-support-essex.co.uk/ecl-private-cloud.html</a> or contact us on 01268 575300.</p>ECLhttp://www.blogger.com/profile/05441693925955384687noreply@blogger.com0tag:blogger.com,1999:blog-7934689722134345481.post-5210118289936795072020-01-31T03:04:00.000-08:002020-02-03T03:07:07.040-08:00Outsource Your IT Support- 7 Reasons Why<p><a href="https://drive.google.com/uc?id=1LJvAXy0QK0NV3FI2OgPJdttuRnU2tB1P"><img width="350" height="233" title=" businessman pressing virtual button" align="right" style="margin: 0px 0px 10px 30px; border: 0px currentcolor; border-image: none; float: right; display: inline; background-image: none;" alt=" businessman pressing virtual button" src="https://drive.google.com/uc?id=1830ESpW4yRLrqdgSvcaUlz-p40ehMWg1" border="0"></a>There are many reasons why businesses should outsource their IT support. Here we discuss 7 reasons to outsource your IT Support. Having an internal IT Manager can be reassuring to many small businesses for reasons such as familiarity of systems and process as well as accountability, however, after reading our list below, you might find the better option is to outsource your IT.<br><br><strong>
1.Reduce the cost of hiring<br></strong><br>
When you are hiring a new member of staff, it is not just the cost of their salary that you need to budget for. The associated costs of recruiting the new member of staff and any costs for taxes, staff benefits, and training will all add up to a significant amount. Choosing to outsource your IT support instead turns what could be a large fixed cost into a variable cost. The amount of support you pay for is based on your individual requirements. You can control the costs when you outsource, choosing from retainer based packages to fixed and scheduled visits.</p><a name='more'></a><p><br><strong>
2.Increase Staff Productivity<br></strong><br>
If you are a small company, you may be tempted to give the job of IT support to existing members of staff. This method keeps costs low, but they may end up spending more time on resolving IT issues that doing their main job which will adversely affect their productivity. Outsourcing IT will free up your staff’s precious time, meaning they can concentrate on helping the business grow.<br><br><strong>
3. Keep on top of the latest technology trends<br></strong><br>
Technology and IT are ever evolving. These changes take time to fully understand and to keep on top of. It may be an unrealistic task to have one member of your business trying to keep ahead of the game. If you were to try this, the cost of training and development could begin to spiral out of control. Having a team of IT specialists at hand whose full-time jobs are to stay on top of these changes will provide you with peace of mind that your IT systems will remain up to date. <br><br>
Companies need to ensure they are taking advantage of the latest products and uses, so having a well-trained IT team with the knowledge of how to implement these new technologies and processes quickly can be very beneficial to your business and keep you ahead of the competition. <br><br>
Not only will an outsourced team be up to date with technology trends, they are in a great position to implement things quickly.<br><br><strong>
4. Availability<br></strong><br>
A major benefit of outsourcing your IT support is that you will have easy access to support. An internal IT manager only be available during his office hours. This could be a problem if you have a technical emergency and they are out of the office on lunch or doing another job. Having access to IT support no matter what time it is will reduce risk of downtime to your company. In turn, this will limit any loss in productivity and associated costs.<br><br><strong>
5. Boost your In-House IT Talent<br></strong><br>
Even if you do have internal IT specialists, having the support of an outsourced team can take the pressure off. If your business is going through change such as an IT project or restructure, outsourcing can help. You can complement the skills you have internally with those of your outsourced team. Also consider what would happen if your IT manager is already involved in sorting out a crisis when another emergency arises. Alternatively, what would happen if your IT manager got a new job, was on holiday or was sick? An outsourced team can help provide full support for you, even if it is only for the short term. Outsourcing your IT will allow your business to remain functional and provide continuity.<br><br><strong>
6. Share the Risk<br></strong><br>
Having an outsourced IT team means you can offload some of the risk. It is the responsibility of your IT support to help you through emergencies. An outsourced IT company is often better than a one-man band as they may have seen similar cases with other clients. Hacker attacks and cyber-security threats are on the rise. Lower your risk by having a full team available to help you with any issues that arise and to prevent them arising in the first place.<br><br>
Your IT company will be able to monitor updates and security for you, meaning you have one less thing to think about. With their industry-specific and extensive knowledge, an IT company will be in a better position to spot potential issues and reduce the level of risk.<br><br><strong>
7. Have access to ongoing Advice and Support<br></strong><br>
It can be comforting for business owners to have an experienced team at hand to contact if you need advice. Deciding to outsource your IT support to an external company can be a simple and seamless process. They have up to date industry knowledge and will be available at any time to help with your business.</p>ECLhttp://www.blogger.com/profile/05441693925955384687noreply@blogger.com0tag:blogger.com,1999:blog-7934689722134345481.post-49025045490348702882019-12-23T05:11:00.000-08:002020-01-20T05:11:59.289-08:00Best Email Practices for Companies to Adopt<p><a href="https://drive.google.com/uc?id=1vH5cgFS9YROnhX28HaA8XmftyKEpK3jI"><img width="350" height="221" title="Email Best Practices" align="right" style="margin: 0px 0px 10px 30px; border: 0px currentcolor; border-image: none; float: right; display: inline; background-image: none;" alt="Email Best Practices" src="https://drive.google.com/uc?id=1_qSHgFXGW0IVsEoqB-SvP48HQKcT8Rxh" border="0"></a>Emails have become a fundamental communication channel for many people and companies. Email is a powerful tool that should be used with consideration for the best results. Here we go through some of the best email etiquette practices that companies should consider adopting for their members of staff to ensure professionalism and efficiency at all times.</p>
<p><strong>1. Be clear in subject lines<br></strong> <br>
Ensure that your subject lines are as clear as possible. You want the recipient to understand exactly what the email will contain before they even open it.<br><br><strong>
2. Always use a professional email address that is standard across the company<br></strong> <br>
Ensure every member of staff uses a professional email address. Never let them use their personal emails and try and obtain a company domain so all will be standardized. This provides professionalism and is expected from companies now.</p><a name='more'></a><p><br><strong>
3. Always greet professionally<br></strong> <br>
Start every email with hello and never anything more casual like hey. Even if the recipient is a friend you need to remain professional in all official correspondence.<br><br><strong>
4. Avoid clicking reply all<br></strong> <br>
It can be annoying when you receive emails that do not have any actions for you to complete. It takes time to read an email and If the topic does not necessarily relate to you or require your input, then you do not need to be included in the email thread. Before sending any email and copying in other people, always check that particular email is relevant to them. Do not add them for the sake of it.<br><br><strong>
5. Always proofread</strong> <br><br>
Emails are quick to type, and often contain typos. The correct use of spelling and grammar is applicable to email even though they are often seen as a relatively informal method of communication. After composing an email, read it over to ensure your message is clear, concise and grammatically correct<br><br><strong>
6. Acknowledge all emails<br></strong> <br>
Even if the email you receive doesn’t require an immediate action, reply to acknowledge you have received it. Try and reply to emails in a timely fashion as well (ideally within 48 hours). If you leave it weeks, the email may no longer be current and relevant.<br><br><strong>
7. Never send emails in all caps<br></strong><br>
All capital letters sound like you are shouting and are not professional. Only use capitals where appropriate such as when referencing acronyms. Also avoid using emojis and excessive use of exclamation marks.<br><br><strong>
8. Be careful with email attachments<br></strong><br>
Warn people before you send large email attachments as they can slow down the recipient’s email inbox. Limit attachments to two items per email. If you need to share a lot of information with them, consider compressing the information into a zip file. Alternatively use document sharing programmes such as WeTransfer, Google Shared Drive or Drop Box. These services allow you to share a large amount of documents in a secure and easy way. <br><br></p><strong>
</strong><p><strong>9. Double Check email addresses before sending<br></strong><br>
Always double check who you are sending your email to before you click send. It is easy to make a mistake and you don’t want anyone to receive a message that was not intended for them, or have the intended recipient not receive vital information.<br><br><strong>
10. Have a professional email signature<br></strong> <br>
Finish your signature with your name, official job title and any logos or accolades associated with your company. Signatures improve your professionalism and legitimacy as we well being a digital business card to help promote your company. Ensure all members of staff have the same signature style for consistency and ensure they are always kept up to date.<br><br><strong>
11. Highlight the importance of an email<br></strong><br>
If you require an urgent response, set your email to high importance to help indicate to others that they need to read as soon as possible. You could also create an urgency system internally where you use flags or numbers to indicate to colleagues the importance of an email. You can use 1 to indicate urgent emails that need an immediate reply, 2 to indicate that it needs action, but it isn’t needed immediately and 3 to show that that the information is important but there is no rush to read it.<br><br><strong>
12. Do not be afraid to pick up the phone<br></strong><br>
If you end up in a long email thread that has become confusing, it may indicate that a phone call would be better as some things are easier to communicate directly. Never say something in an email that you would not be willing to discuss over the phone or to someone’s face.<br><br><strong>
13. Never use emails to organize your work<br></strong><br>
There are dedicated tools that can help you keep track of your work so avoid keeping to-do lists in your email as they can be easily missed.<br><br><strong>
14. Keep email topics separate</strong> <br><br>
Do not use an old email thread to discuss a new topic. Instead, start a new email thread with a new subject line that corresponds to the new topic. This practice will make your communication a lot easier to follow and also makes it easier to find old emails.<br><br><strong>
15. Have a clear email structure<br></strong><br>
Start all emails with an introduction that clearly identifies why you are getting in touch. Ensure the body of your email contains clear information that supports your introduction. Use bullet points to get your point across clearly and quickly if necessary. End your emails with a strong call to action. This prompts the recipient to reply quickly to you and can help tasks get done faster.<br><br>
Emails are a reflection of you and your company and therefore you need all your emails to come across as professional. Ensure your staff are trained when they join the company to ensure a consistently high standard of email communication. These tips we have discussed may be simple but they can easily be overlooked. </p>ECLhttp://www.blogger.com/profile/05441693925955384687noreply@blogger.com0tag:blogger.com,1999:blog-7934689722134345481.post-27205041307827079972019-11-28T06:58:00.000-08:002019-12-02T06:58:30.819-08:005 Steps for creating a cyber security prevention plan<a href="https://drive.google.com/uc?id=1gxopuS18JTGeADVr1ZUXfkb9ew6KlGMK"><img width="350" height="262" title="Security concept" align="right" style="margin: 0px 0px 10px 10px; border-image: none; float: right; display: inline;" alt="Security concept" src="https://drive.google.com/uc?id=1JTTi_wRJs3_58QcG51hkB6SbpK8V9EMf"><br></a><p>Cybercrime is risk to any business with an online presence. Cyber-attacks can have huge and sometimes detrimental implications for a business. A cyber- attack may even reduce trust in the company which can dramatically affect sales. As technological sophistication levels rise hackers are becoming equally as sophisticated. All companies should ensure they have a security prevention plan in place to try and avoid the damage cyber-attacks could do. <br><br>
Here we discuss the 5 steps to improve cyber security in your business.</p><a name='more'></a><p><br><strong>
Show that you are committed to cyber security</strong> <br><br>
Demonstrate to your employees that your company takes cyber security seriously. Ingrain best- practises into the culture. Lead by example, and your employees should follow. Attend cyber security training, create a cyber security strategy and ensure all employees understand what this strategy is and what actions they should take to enforce it. There are also opportunities for you to become certified in areas of cyber security. Although this is optional, it creates a strong, positive image that you are fully on-board with cyber security and have a solid strategy.<br><br><strong>
Ensure you have layers of security</strong> <br><br>
Never rely on a single layer of security as this exposes your business to all sorts of risks. Have a mixture of human and computer led monitoring on a regular basis to make sure your cyber security remains strong. Also ensure that malware protection is present. Avoid using free products if possible as some of these do not provide the level of protection they suggest.<br><br><strong>
Keep passwords safe<br></strong><br>
Enforce a rule that employees must have strong passwords for all software and programs that they use. Ensure they use complex but unique passwords for everything. To make this easier, you can use a password manager which stores these passwords. This reduces the risk of employees choosing weak and repetitive passwords, it also enables you to check the strength of the passwords yourself. You can create strong passwords within the program as well as quickly change any passwords en masse if you need to. <br><br><strong>
Avoid older programs</strong> <br>
Avoid using older systems such as Windows XP as they do not receive updates and can leave your PC more vulnerable to cyber-attacks.<br><br><strong>
Educate your employees</strong><br>
- Provide training for all your employees. You may be fully invested in cyber security but if your staff are not and do not have the correct knowledge, you are putting your business at risk. You can either conduct the training yourself or introduce external training.<br>
- Inform your employees of some things they can look out for such as spotting malicious emails by noticing grammatical errors in the email address.<br>
- Data breaches in small to medium sized companies can be the result of internal issues such as misusing data or lack of cyber protection knowledge so it is vital your employees understand the seriousness of a cyber-attack threat. If employees do not have the training, your organisation is more at risk from hackers.<br>
- Ensure the employees can only access the information they need to carry out their job. Alter permissions to only allow certain people to view sensitive documents. For example, only a few people will need access to HR files.<br><br><strong>
Have a recovery plan</strong><br>
Although your plan should prevent cyber-attacks happening in the first place, unfortunately it is something you cannot prevent with 100% certainty. This is due to the rapid complexity nature of technology. Always have a recovery plan ready in case the worst happens as it means you can handle the situation much quicker and in turn hopefully limit the damage caused.<br><br>
Once you have a cyber prevention plan in place, update it regularly. Never think that once you have completed the plan you do not have to make tweaks. Cyber security is a continuous working process requiring constant vigilance and updating. and you will need to undertake regular checks and audits to see if there is anything else you can do. Some cyber-attacks may never be detected in time however, having a strong prevention plan protects your business and your investment as much as possible which will provide you with peace of mind.</p>ECLhttp://www.blogger.com/profile/05441693925955384687noreply@blogger.com0tag:blogger.com,1999:blog-7934689722134345481.post-62618582722414627062019-10-21T01:54:00.000-07:002019-10-21T01:54:05.680-07:0010 things for IT departments to do when an employee leaves their job<p><a href="https://drive.google.com/uc?id=1Z07WuR0XcRpo8YVygQ5CJRN7Ek-KHkW9"><img width="300" height="198" title="sad office workers looking at fired colleague" align="right" style="margin: 0px 0px 10px 10px; border: 0px currentcolor; border-image: none; float: right; display: inline; background-image: none;" alt="sad office workers looking at fired colleague" src="https://drive.google.com/uc?id=1jOHj9CyqRG2WrlPRnn3T9X9uUvTcqnM0" border="0"></a>It is inevitable that you will have employees come and go throughout the years. Whether the employee has left due to poor performance, the company downsizing, or they are moving on to another job, you must consider the actions needed to happen to ensure once they have left your company data remains secure. Here we discuss a checklist of actions you need to take to ensure IT security remains tight once an employee has left. Regardless of whether there was hostility when the employee left or it was amicable, you can never be too safe when it comes to sensitive information and company secrets.<br><br>
Once the decision has been made that the employee is leaving (regardless of whether this decision was made by the company or the individual) the HR department should let the IT department know immediately the date the employee is leaving so they can complete the actions on the checklist.<br><br></p><a name='more'></a><p><br><br><strong>
1. Revoke access to their email</strong> <br>
This is something that should be done as soon as they have officially stopped working for the company. In many cases, a company often leaves it a few hours or even days before they get around to doing this. Although in most circumstances the employee will not try and access any information once they have finished working for the company, the fact that they would be able to could be a massive security risk for the company. Ensure all permissions and access are removed as soon as possible. Also be aware that if the employee knew they were leaving they could have emailed some information across to another email account prior to them leaving. Check for suspicious behaviour (e.g. a large amount of forwarded emails)<br><br><strong>
2. Set up auto forward emails</strong> <br>
This should happen immediately after you have revoked email access from the individual. Set up an automatic forwarding system so that all emails sent to that employee now get sent to another member of staff. Also set up an automatic reply to send people which says the employee in question no longer works here and state who their new point of contact will be along with their contact details. This ensures a smooth and professional transition.<br><br><strong>
3. Remove access to all systems and documents</strong> <br>
Ensure the member of staff cannot access any of the internal systems and documents. <br><br><strong>
4. Ensure full handover of their work</strong> <br>
Although a lot of companies have a shared drive where people upload their work, some employees may have documents saved in other locations. Although this is difficult to track, ensure you are happy they have passed over all their documents before they leave. <br><br><strong>
5. Take back any company devices</strong> <br>
Ensure any device the member of staff was given (e.g. phone or laptop) is returned before they leave. Complications arise when the company has a BYOD (Bring Your Own Device) Policy. If this is the case, you should have it in your company handbook that you have permission to remove any company information from their device, keeping their individual information untouched. Also ensure they do not have access to log on to the company’s social media accounts from their phone as this is often forgotten about and could have consequences.<br><br><strong>
6. Change all passwords</strong><br>
Ensure all passwords for any logins the employee had access to is changed as soon as they leave. <br><br><strong>
7. Change PIN numbers</strong> <br>
If the member of staff had access to a company credit card, again ensure the PIN number is changed. <br><br><strong>
8. Back Up data</strong><br>
This is common practice that should be happening on a regular basis regardless of whether someone is leaving. However, when an employee leaves is a great opportunity to carry this task out. <br><br><strong>
9. Have a non-compete clause</strong> <br>
A lot of companies have trade secrets which cannot afford to get in the hands of competitors. To reduce this risk, you should have a non-competitor clause in their contracts that state they cannot work with competitors for at least a certain amount of time.<br><br><strong>
10. Monitor employee activity</strong> <br>
It is important that you have the ability to detect any suspicious behaviour from employees. If they are planning to leave but haven’t told anyone yet, the employee could have weeks, if not months of time to slowly transfer sensitive information out of the company. This is a worst-case scenario, but you should set it up so you can monitor your employees’ activities online. Ensure you have it stated in your employee handbook that you have the right to monitor their activity. It will need to explain that it is for the safety of both the employees and the company. You need to be upfront about your ability to monitor them so that the rest of the staff don’t feel like they are constantly being watched.<br><br>
Although in the majority of cases, when an employee leaves you will not have any issues, by having this checklist in place and have a procedure of how to deal with employees leaving, you are ensuring your company is as secure as possible.</p>ECLhttp://www.blogger.com/profile/05441693925955384687noreply@blogger.com0tag:blogger.com,1999:blog-7934689722134345481.post-40993361641040192402019-09-30T01:45:00.002-07:002019-09-30T01:49:56.938-07:00The dangers of working remotely<p><a href="https://drive.google.com/uc?id=1r4LiIyp9UGQT2QpUXNWRqMygx7nDUSlJ"><img width="300" height="200" title="Working Remotely" align="right" style="margin: 0px 0px 10px 10px; border: 0px currentcolor; border-image: none; float: right; display: inline; background-image: none;" alt="Working Remotely" src="https://drive.google.com/uc?id=1ZRe04KSCRuSfIR7CaD94pfx2YQT30cFQ" border="0"></a>It is common nowadays to have a lot of your staff, at some point, working remotely. Whether this be from home, at a client’s office, in a coffee shop or by hiring freelancers, it has never been easier to access your work and continue your job outside of the office. <br><br>
Despite this freedom being convenient and the fact that it can increase productivity, remote working can be potentially dangerous for the company. Here we discuss what the dangers and risks are and what actions you can implement to ensure online safety for all your staff that take their work out of the office. </p><a name='more'></a><p><br></p><p><strong>Top dangers for working remotely<br></strong><br><strong><font size="2">
</font></strong><strong>
Wi Fi security issues</strong><br>
A lot of public places such as coffee shops promote remote workers as they form loyal and profitable customers. To entice this clientele in they usually offer free Wi-Fi as an extra incentive. This may be handy to the worker, but Wi-Fi related security incidences are extremely common. Although Wi-Fi related incidents can happen in a range of places, studies have shown a large proportion of them taking place at coffee shops and cafes. Working on public Wi-Fi networks can allow cyber criminals to spy on private data, passwords etc.<br><br><strong>
Personal Devices</strong> <br>
Some companies have BYOD policies (Bring Your Own Device) and allow their staff to use their own laptops, tablets and mobile devices to carry out company work. Although this is a great cost-effective method as the latest tech is expensive, your company is making itself more at risk as you do not have control over these devices and their security measures. Certain studies have suggested a high amount of business owners believe having a BYOD policy has increased mobile security risks. Workers are also likely to let non employees (such as friends and family) use their personal devices for non-work-related tasks, again increasing the risk of a data breach.<br><br><strong>
Out of Date Software</strong><br>
If you do not have full control over the devices remote workers are using, then you have no guarantee that the software and security measures are up to date and fully enforced by each member of staff. </p><p><br><strong>
Theft</strong><br>
Although we are focused on risks from an online point of view, it cannot be ignored that when people are working in public spaces, there are at risk of having their devices stolen. If these devices do not have strong enough security on them, you are automatically at risk of having someone access valuable company data. If it is their own device as well, it means their personal data is also at risk.</p><p><br><strong>
Tips to help manage the risk<br></strong><br>
Although there are always risks associated with online activity, here are some actionable tips you can implement into your business.<br><br>
• Turn off sharing on your Windows and Mac devices if you are using public Wi-Fi<br>
• Ensure employees protect documents with passwords <br>
• Provide employees with work devices if possible<br>
• Have a remote working policy that is easily accessible to all relevant staff<br>
• Do not allow personal information on work devices. <br>
• Never send sensitive information whilst using open / public Wi-Fi networks <br>
• Use a VPN (Virtual Private Network) to ensure things are encrypted. This is especially important if you are using a public Wi-Fi source<br>
• Ensure employees use different passwords for work related tasks <br>
• Use Find My Device features on laptops and phones to allow you to try and relocate them if they are ever lost<br>
• Save work on secure cloud-based storage rather than saving everything to the device itself <br>
• Ensure all work is backed up <br>
• Ensure security software, firewalls and anti-virus systems are all in place on devices. If they are company property you can regularly check they are updated.<br>
• Enforce data encryption on all devices (ideally those owned by the individuals as well) <br>
• Keep software updated at all times <br>
• Use two factor authentications wherever possible<br>
• Only allow workers access to the data and documents they need. You can change these settings to ensure they do not have access to everything and can revoke access when necessary<br><br>
By taking into account these potential risks and implementing as many preventative measures as possible, you can still work remotely successfully. Flexible working is common nowadays, with more and more people embracing this style of working. It is not a trend that is likely to go away any time soon however it is achievable to have remote working and be safe if you ensure the necessary safety measures are in place, and everyone is aware of them. In a lot of cases, the security incidents caused by remote working could have been avoided. Taking these measures now will hopefully avoid such incidents happening within your company.</p>ECLhttp://www.blogger.com/profile/05441693925955384687noreply@blogger.com0tag:blogger.com,1999:blog-7934689722134345481.post-63070927535955422092019-08-19T05:09:00.001-07:002019-08-19T05:09:34.815-07:00How Office 365 can benefit your business<p><a href="https://drive.google.com/uc?id=1BifbkA_1yJBCulIpFjeb1qUnyzo7z5Il"><img width="350" height="239" title="" align="right" style="margin: 0px 0px 10px 10px; border: 0px currentcolor; border-image: none; float: right; display: inline; background-image: none;" alt="" src="https://drive.google.com/uc?id=1WEv4rQDUoKf4jGQlM6j8d1mjOU85nFhB" border="0"></a>Office 365 is “Microsoft Office in the Cloud” and provides access to email, contacts, documents and calendars wherever you are via cloud computing. </p><p>
Office 365 comes with a range of functions which can be extremely useful to your staff. Some of these features you may not even be aware of, but they have the ability to revolutionise the way you work and improve both productivity and efficiency. Here we discuss some of the top features Microsoft Office 365 provides and how they can be used effectively within your business. </p><p><strong>
Lots of storage</strong> <br>
A common problem, depending on your area of work, can be not having enough storage. With Office 365 each user gets 50GB worth of storage with Exchange online that can be used for emails, storing contacts, your calendar, storing notes, etc. Having access to the OneDrive cloud storage on email also means you can save space by using this for attachments. Each user also gets 1TB of storage available through OneDrive so there is no worry about running out of space.</p><a name='more'></a><p><strong>
Co-author documents in real time</strong> <br>
Because it is cloud based, there is an option to collaborate on documents at the same time as each other. If you save your document on the OneDrive, others can work on it with you. You can see the edits as they are being made in real time and can also see who is making what amends. Version control is also included so you can retrieve different versions of the document before certain edits were made.</p><p><strong>
Chat with colleagues</strong><br>
You can integrate Skype into your office apps and use this to chat to each other, share your screens and have both audio or video conversations with colleagues. You can do all this whilst still working on whatever application you were currently using. This is great for quick meetings and sharing work without having to use a meeting room, which saves time. </p><p><strong>
Use your mouse as a laser pointer during presentations</strong><br>
This small feature can make a big impact when presenting. You can use the keyboard shortcut (Ctrl +P) to turn your mouse into a laser, making it easy to point to specific things during a presentation to highlight key points. The feature is also available on touch screen devices (just hold your finger down on the device).</p><p><strong>
PDFs made easy</strong><br>
Once you have completed a Word document or spreadsheet, it is a good idea to convert it to a PDF. This is simple on Office 365 as you just choose the Save as PDF option and it will convert it for you. The best part is, if you realise you need to edit the document, you can easily convert it back to a Word document without any formatting issues.</p><p><strong>
Work offline</strong> <br>
As the personal OneDrive Storage is synced to the device you are working on, you do not necessarily need to be online to continue working. Working offline is possible and once you are reconnected to the Internet, your newer documents and recent amends will automatically upload. </p><p><strong>
Work from any device</strong><br>
You can use your Office Web apps from any device that allows you to download the apps. Having the same access on your desktop, laptop, tablet and phone means you are never dependent on being in a particular location, creating a much more flexible way of working.</p><p><strong>
Continue reading easily</strong> <br>
If you have a large document to read, it is annoying if you lose your place if you have to read it in several sittings or you have been interrupted. Office 365 comes with a resume reading feature on Word which allows you to continue reading exactly where you left off, even if you are on a different device. This automatic bookmarking can be a real time saver.</p><p><strong>
Already used to the apps</strong><br>
Although Office 365 is cloud based, the apps included are still essentially the same programmes that your employees will be used to working on such as Word, Excel Spreadsheets and Powerpoint Presentations. This familiarity is great as they can switch to a cloud-based system without having to learn how new programmes work.</p><p><strong>
Organise calendars</strong><br>
You can easily convert One Note messages to tasks within your calendar and can also assign them to colleagues along with reminders and deadlines. This feature is also great for circulating meeting notes by email and send them to the relevant attendees.</p><p><strong>
Organise your team’s work</strong><br>
Office 365 has a planner which can help plan workflows. It works like a project management tool where you can assign people tasks, share files and set deadlines. You can update the progress of these tasks and uses email notifications in order to keep everyone in the loop and up the date.</p><p><strong>
Smart email inbox</strong> <br>
A clever and useful feature is Microsoft’s clutter feature which automatically organises your emails for you. They make priority messages more visible and other emails are moved to the clutter folder. Over time, the feature will understand which items you deem as clutter and which ones you think are important by your behaviour. </p><p>
For businesses of all sizes, the features provided by Office 365 can be extremely useful. They allow people to work in much more flexible and collaborative ways with the aim of providing a quicker and efficient way of working which can hopefully lead to an increase in productivity. </p><p>
Here at ECL, our experienced Account Managers are always on hand to discuss your requirements, help you plan your ongoing IT strategy and answer your questions. For more information on Office 365 or to set up a free trial, call us on 01268 575300 or email us on <a href="mailto:info@ecl.co.uk">info@ecl.co.uk<br></a></p>ECLhttp://www.blogger.com/profile/05441693925955384687noreply@blogger.com0tag:blogger.com,1999:blog-7934689722134345481.post-65656124422692487002019-07-15T10:00:00.000-07:002019-07-15T10:00:03.951-07:00How safe is your password?<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi07LGln5ukFnpVkbuwCn3BGUmT93axpY7FvtrtlKVqd72Z5WDI5J-htcuGD6-uGDSefnvYPt8A9P2aTDR_e8ko1cQ48ofUlE9PdK0wp8E_NyxgGrAW8-QMaJoUQULENRbo80W9HPV-Z7rn/s1600/Password+Post+It.jpeg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" data-original-height="1067" data-original-width="1600" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi07LGln5ukFnpVkbuwCn3BGUmT93axpY7FvtrtlKVqd72Z5WDI5J-htcuGD6-uGDSefnvYPt8A9P2aTDR_e8ko1cQ48ofUlE9PdK0wp8E_NyxgGrAW8-QMaJoUQULENRbo80W9HPV-Z7rn/s320/Password+Post+It.jpeg" width="320" /></a></div>
There has never been a more important time for your company to be as secure as possible online. With the constant development of technology, it has become more common for cyber threats to occur.<br />
<br />
Having passwords online is the first step to achieve this security, however, it is scary when you hear potentially how easy it is for people to break through these passwords if they are not strong enough. This poses a security risk for both the individual and the business as a whole so it is vital that all passwords used are as strong as they can be. Password theft is growing in popularity and can lead to a privacy breech of data or even identity theft. This article discusses the dangers of password theft and what actions businesses can take to ensure that their assets remain safe.<br />
<a name='more'></a><br />
<br />
When considering a password, use the following tips and ensure all your staff follow these as well:<br />
<br />
<b>1. Choose a long password</b><br />
This one is quite self-explanatory. The longer the password is, the less predictable it may be and will be harder for hackers to figure out. You can also put some random shorter words together to form a long password, so it remains easily memorable to you. Most things ask you to have a password that is a minimum of 6-8 characters. Short passwords can sometimes be guessed within seconds using some of the technology available to hackers. Bearing this in mind, using a longer password will benefit you.<br />
<br />
<b>2. Mix your password up</b> <br />
Some applications require special characters and capitals in order for it to be a valid password. However, even if this is not a requirement, you should still consider doing it. Adding random special characters (e.g. #, @, !, $) will instantly make it more difficult to guess. Also add the use of capital letters as well. You do not need to stay grammatically correct here. Add capital letters and special characters as randomly as possible. Try to consider words that are not in the dictionary as these will be especially difficult to decipher.<br />
<br />
<b>3. Do not use a pattern</b><br />
It can be tempting when you have to decide on a password quickly to choose something which quickly comes to mind, but this means that it may quickly come to the mind of a hacker as well. Using patterns such as “12345” and “qwerty” are really common and will be cracked really quickly. Try not to include something as predictable as your birthday, your birthday year or the current year either.<br />
<br />
According to a study from Keeper, a password manager, here are some of the most popular passwords of 2019<br />
<br />
1. 123456<br />
2. 123456789<br />
3. qwerty<br />
4. 12345678<br />
5. 111111<br />
6. 1234567890<br />
7. 1234567<br />
8. Password<br />
9. 123123<br />
10. 987654321<br />
<br />
<b>4. Do not make it personal</b> <br />
Leading on from the above point, it is never a good idea to reveal anything personal in a password, especially when it is for a work account. Using birthdays, anniversaries, mother’s maiden name, old school or pet names will be some of the most obvious choices. Although its personal information to you, it is information others can easily access if they wanted to. Also make sure your passwords that you use at work are completely different to those you use for personal use. Although all passwords should be different, many people choose the same or similar passwords for more than one thing. This is not ideal but especially if you use similar passwords for your personal and work accounts. This will increase the risk of you losing more information as if they break your work password, they can potentially access your personal data as well.<br />
<br />
<b>5. Don’t repeat passwords</b><br />
As we discussed before, many people reuse passwords for various things. Each time you repeat a password, it puts you more at risk. It can become very tiring and complicated to have a lot of different passwords to remember, however if its possible for you to do it then always use different ones.<br />
<br />
<b>6. Change passwords </b><br />
You should change your passwords every now and then as good practice, however try not to get your staff to change their passwords too regularly. Although this will keep everything more secure, it is sometimes not realistic to expect staff to keep remembering new passwords if it is changing too often. The confusion it causes could lead to more forgotten passwords and locked accounts which could waste a lot of time and reduce productivity in the office. Determine the regularity of changing passwords that works for your company and staff. However, if you ever feel there has been a security risk, ensure everyone changes their password immediately, regardless of the last time they changed them.<br />
<br />
<b>7. Never write passwords down</b><br />
Struggling to remember a certain password? Or has a colleague just shared a password with you? If so, no matter what, don’t write it down. As easy as it is to quickly jot the password down on a post it note or piece of paper, this is a dangerous thing to do. It could easily fall into the wrong hands this way and be seen by several people who shouldn’t have access to that information.<br />
<br />
<b>8. Use a password manager</b><br />
As it is really difficult to remember a lot of different passwords (especially if they are as complex as they should be) then a password manager is a great option for a business. A password manager stores all the passwords in an encrypted file and stops you having to remember them all. Instead, you just have to remember a master password. They are also a more secure way of sharing passwords to different members of the team. It avoids people having to say the passwords out loud or via email which is unsafe. A password manager ensures only authorized people have access to the passwords they need.<br />
<br />
Here at ECL, our experienced Account Managers are always on hand to discuss your requirements, help you plan your ongoing IT strategy and answer your questions. For more information, please call us on 01268 575300 or email us on <a href="mailto:info@ecl.co.uk">info@ecl.co.uk</a>ECLhttp://www.blogger.com/profile/05441693925955384687noreply@blogger.com0tag:blogger.com,1999:blog-7934689722134345481.post-11838047889924161092019-06-26T01:28:00.001-07:002019-06-26T01:29:13.916-07:00What is a firewall and why do you need one?<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTlYnPLHWkNkrBsvZyTPE4-jDJQgkejQAU4B1yiVx6wP4E1u6iynlyuMXJfeVCY6QDghFTNDh1gIjnO3ONI5ZHl6WcmLEFQDWWH60OtJdUXcTqWXmQX7-wyZaiqy2ecbYZIr4dzVhp5KWK/s1600/AdobeStock_139457644-+Firewall.jpeg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" data-original-height="1103" data-original-width="1600" height="220" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTlYnPLHWkNkrBsvZyTPE4-jDJQgkejQAU4B1yiVx6wP4E1u6iynlyuMXJfeVCY6QDghFTNDh1gIjnO3ONI5ZHl6WcmLEFQDWWH60OtJdUXcTqWXmQX7-wyZaiqy2ecbYZIr4dzVhp5KWK/s320/AdobeStock_139457644-+Firewall.jpeg" width="320" /></a></div>
Firewalls are a protective barrier between your computer, phone or tablet and the other computers that are connected to you. As soon as you are connected to the internet, the whole world can see you and this can make your computer vulnerable to cyber threats. When data is exchanged between computers it goes into cyberspace. Firewalls monitor this data to decide whether it is safe, and therefore firewalls are essential!<br />
<br />
If your computer is left unprotected, it can quickly be attacked with popup messages and viruses among other things, all in a matter of minutes. Having a firewall installed can prevent some of these attacks from taking place. In some instances, hackers can install a trojan (malware which is misleading to the user) onto your PC which will give them the power to control it.<br />
<a name='more'></a><br />
A good firewall should monitor incoming data as well as your outgoing data in order to keep private information safe.<br />
<br />
<b>How can a firewall help?</b><br />
- It can protect your computer from being controlled by unauthorised remote access<br />
- It can block unsuitable content<br />
- It will alert you about any suspicious activity or content<br />
<br />
<b>Firewalls cannot do everything</b><br />
Firewalls are extremely important, but they cannot do everything. Although they can keep your computer safe from unauthorised access, they cannot remove any malware that was already on your computer. You should therefore always use a firewall alongside other anti-virus software, to provide additional and stronger security.<br />
<br />
In a world where the majority of our business involves computers in some form or another, it has never been more vital that online security is considered, and firewalls are one part of this.<br />
<br />
Here at ECL, we have extensive experience in protecting businesses against the latest computer hacks, viruses, malware, spam and other threats and can advise you on the best methods of protecting your business. We can also help businesses to upgrade and run the latest and most secure versions of operating systems. For more information, please call us on 01268 575300 or email us on <a href="mailto:info@ecl.co.uk">info@ecl.co.uk</a>ECLhttp://www.blogger.com/profile/05441693925955384687noreply@blogger.com0tag:blogger.com,1999:blog-7934689722134345481.post-16822011215787670642019-05-13T07:12:00.000-07:002019-05-13T07:12:23.132-07:00How Cloud Computing can help your business<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAbv6nOKRTwIaY96TA_fQYRXFz_KOX4SX8FlWEGgPMzDH_wHvie-2AcwJfI2gmzndtefResmtLHEpe0JHojSHU4wJZ-MP2iLeGynQ5mx9bga2hKNAMMGLxJgdxn88hXEIYUuX7HiKuyG0k/s1600/Devices.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" data-original-height="1067" data-original-width="1600" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAbv6nOKRTwIaY96TA_fQYRXFz_KOX4SX8FlWEGgPMzDH_wHvie-2AcwJfI2gmzndtefResmtLHEpe0JHojSHU4wJZ-MP2iLeGynQ5mx9bga2hKNAMMGLxJgdxn88hXEIYUuX7HiKuyG0k/s320/Devices.jpg" width="320" /></a></div>
Cloud computing is everywhere and has definitely become part of our daily lives. Whether you are watching films, listening to music, editing documents or checking your email, you are already using it. Cloud computing is about storing data on the internet rather than hard drives, meaning you can store unlimited amounts of data over the internet which was impossible before.<br />
<br /><b>How can your business benefit?</b><br />There are many reasons why many businesses across the world are using Cloud computing. Here a just a few:<br />
<br />
<a name='more'></a>- <b>It is flexible</b> - You no longer need to be on the computer that you use to create the original document. With cloud computing you can access your documents on all your smart devices, anytime, anywhere, as long as you have an internet connection.<br />
<br />- <b>It is up to date</b> - Your business does not have to worry about running updates on old software. With cloud computing, all updates are done automatically which saves precious time that could be spent on other aspects of the company. There are also less maintenance issues associated with cloud computing.<br />
<br />- <b>It is secure</b> - Despite some people having reservations over the security of cloud computing, it is just as secure, if not more so, than storing your data on a hard drive. You can easily change passwords which will only be shared with authorised personnel. There are also ways for the information to be encrypted for additional security. You can also remove any sensitive data if you happened to have any laptops or devices go missing.<br />
<br />- <b>It is backed up</b> - If, for whatever reason, your business faces the horror of having your information wiped, there are cloud-based recovery options which allow you to access this information again which can only happen because the information is stored on the internet. However, be warned, as not all Cloud service providers automatically backup data held on their platform, so make sure you look at this carefully if this is important to you or your business.<br />
<br />- <b>It is environmentally friendly</b> - Cloud computing reduces the amount of paper that is consumed along with the cost of energy used for powering and cooling internal servers.<br />
<br />- <b>It is cost effective </b>- Cloud computing can save your company a lot of money by not having to purchase expensive hard drive storage solutions. It also reduces the need to have a large internal IT department, if any.<br />
<br />- <b>It is user friendly, powerful and quick</b> - Cloud computing has meant that it has never been easier or faster to access photos, videos and documents before.<br />
<br />- <b> It is good for collaboration</b> - As the information is on the internet, it is easy to collaborate with different people on the same documents, even from the other side of the world. This opens up opportunities for businesses worldwide.<br />
<br />- <b>It means more storage</b> - You don’t have to worry about storage space like you had to in the past with hard drive storage as the internet is unlimited.<br />
<br />Here at ECL we offer a Private Cloud in our own state of art Hosting Platform which is provided for the exclusive use of ECL clients. For more information, please call us on 01268 575300 or email us on <a href="mailto:info@ecl.co.uk">info@ecl.co.uk</a><br />ECLhttp://www.blogger.com/profile/14835417899092914599noreply@blogger.com0tag:blogger.com,1999:blog-7934689722134345481.post-12591126998415256452019-04-30T07:03:00.000-07:002019-05-13T07:03:39.729-07:009 Reasons why your computer may be slow<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhO7a965ZFgTzhmEd3ETYmenwdrLzoQnn3LobpVsrVOdlKWSqQSzIb9nwcOT9OJp7rXx0MzvC3-rj13B_Btk_Tt-mKe2PYTdm-DOovL2GZxLl242YolNIvF3gqUir4cSTc7XMgG5s5qUjB_/s1600/Computer+being+slow.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" data-original-height="1067" data-original-width="1600" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhO7a965ZFgTzhmEd3ETYmenwdrLzoQnn3LobpVsrVOdlKWSqQSzIb9nwcOT9OJp7rXx0MzvC3-rj13B_Btk_Tt-mKe2PYTdm-DOovL2GZxLl242YolNIvF3gqUir4cSTc7XMgG5s5qUjB_/s320/Computer+being+slow.jpg" width="320" /></a></div>
It can be extremely frustrating when your computer is slow as it can reduce your productivity and make you job harder. There are many reasons why your computer may be slow, some of which are simple and easy to avoid.<br />
<br />
<b>1. Your hard drive may be failing </b><br />
This can happen over time as a hard drive is constantly moving and, as with anything that consists of moving parts, they can eventually wear down.<br />
<br />
<b>How to fix:</b> Run a hard drive check.<br />
<br />
<a name='more'></a><br />
<b>2. Your hard drive may be almost full</b><br />
If you hard drive gets to 95% full, your computer can slow down significantly. If there is insufficient space for the computer to save files required for the computer to operate, the computer will start to not work correctly.<br />
<br />
<b>How to fix:</b> Run a hard drive check to see what you can remove. Try checking your recycle bin first and delete what you don’t need.<br />
<br />
<b>3. You have too many start up programs</b> <br />
When you install a new programme, the majority ask you for permission to start automatically when you switch on your computer. Although this is a good idea for certain programmes such as firewall and antivirus software, other programmes such as Microsoft Office and Spotify to not need to automatically run and should be left until you need them.<br />
<br />
<b>How to fix:</b> Change your settings and don’t allow permission to start up automatically.<br />
<br />
<b>4. You are running too many programs at once</b><br />
Although computers are designed to work on multiple things at once, if there are too many things open, the computer will start to suffer and slow down. If you are using too much of its RAM, the processing power will decrease.<br />
<br />
How to fix: Get rid of tabs you don’t really need.<br />
<br />
<b>5. Your anti-virus software </b><br />
It is important that all computers have anti-virus software, however in order for them to continue working effectively they have to perform regular checks to your computer which can sometimes take hours. Because these checks are using processing power in the background, you could notice your computer being slow.<br />
<br />
<b>How to fix:</b> Change the settings so long updates happen at night or after work hours.<br />
<br />
<b>6. You have a virus </b><br />
Viruses can immediately slow down your computer as they mess with a lot of different elements of your computer which can lead to the computer being slow or crashing.<br />
<br />
<b>How to fix:</b> Run regular anti-virus scans.<br />
<br />
<b>7. Your room is too dusty </b><br />
Sometimes, something as simple as dust can stop your computer working as quickly. Computers need ventilation in order run correctly and not over heat, however this does mean dust can easily get in.<br />
<br />
<b>How to fix:</b> Use compressed air to clean the computer and don’t place a laptop on a soft surface such as a duvet or blanket which will block the ventilation.<br />
<br />
<b>8. You don’t have enough memory</b><br />
Even if you’ve got rid of anything you don’t need on the computer and checked for viruses, you may still find your computer being slow. If this is the case, you may simply not have enough memory to perform the actions you require.<br />
<br />
<b>How to fix:</b> Consider buying additional memory.<br />
<br />
<b>9. You need to restart your computer</b><br />
Although this seems like a simple method, switching a computer off and on again can really help. Sometimes programmes can get stuck and continue to process in the background without you realising. Restarting your computing flushes the system so you can start again.<br />
<br />
<b>How to fix:</b> Simply restart your computer.<br />
<br />
Here at ECL we have extensive experience in helping businesses find the right IT solutions as well as protecting them from the latest malware, virus and other cyber threats. For more information please call us on 01268 575300 or email us on <a href="mailto:info@ecl.co.uk">info@ecl.co.uk</a>ECLhttp://www.blogger.com/profile/14835417899092914599noreply@blogger.com0tag:blogger.com,1999:blog-7934689722134345481.post-57906493650442549302019-03-27T06:52:00.000-07:002019-05-13T06:54:17.510-07:00Kwik Fit hack highlights dangers of malware for businesses<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYdz57mY9x6rXo4g52Sj4TqCn8ge12eXY4niaW4hu3nb1Yib8nj1wPKvesHD0Eym98N4r2mHuTuzDtRZ_-UDi7CSxJyuFbZLJLwun7wERE6ZGLu8SL1X3ySzat1MJpcXXvbJ5OrPmgHvsj/s1600/ecl+blog+56+-+kwik+fit+hack+highlights+dangers+of+malware+for+businesses.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" data-original-height="950" data-original-width="1267" height="239" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYdz57mY9x6rXo4g52Sj4TqCn8ge12eXY4niaW4hu3nb1Yib8nj1wPKvesHD0Eym98N4r2mHuTuzDtRZ_-UDi7CSxJyuFbZLJLwun7wERE6ZGLu8SL1X3ySzat1MJpcXXvbJ5OrPmgHvsj/s320/ecl+blog+56+-+kwik+fit+hack+highlights+dangers+of+malware+for+businesses.jpg" width="320" /></a></div>
Recently we wrote an article detailing predictions from some of the world’s top experts including McAfee and the World Economic Forum forecasting greater levels of hacking and phishing in 2019. Well it appears that we have the first major casualty of 2019 with a major hack of UK firm Kwik Fit’s computer network.<br />
<br />
The popular car service specialist has over 600 garages across the United Kingdom and Ireland and provides tyres, exhausts, batteries and breaks as well as MOT testing and car servicing. However, the chain experienced a recent malware attack which caused huge delays to customers’ car repairs as garages were unable to process orders.<br />
<a name='more'></a><br />
<br />
The news was first highlighted after the company responded to a customer complaint on the social media network Twitter. A number of customers complained that appointments had been cancelled and that phone lines were not being answered. The company responded by explaining that there were ongoing “technical difficulties” causing systems to go offline and that they were working on a fix. Despite claiming that the problem had been fixed, users continued to report problems, with the company eventually explaining and confirming that a virus had infected its IT systems – likely to be malware but that that data was not believed to be compromised.<br />
<br />
This latest incident of malware infection highlights the headache of IT security for all types of businesses in the UK and the scope of the disruption it can cause. What’s more, this is a trend that is only expected to grow in the near future with more and more businesses being targeted for infection and subsequent extortion.<br />
<br />
Here at ECL, we have extensive experience in protecting businesses against the latest computer hacks, viruses, malware, spam, phishing scams and other threats and can advise you on the best methods of protecting your business. We can also help businesses to upgrade and run the latest and most secure versions of operating systems. For more information, please call us on 01268 575300 or email us on <a href="mailto:info@ecl.co.uk">info@ecl.co.uk</a>.ECLhttp://www.blogger.com/profile/14835417899092914599noreply@blogger.com0tag:blogger.com,1999:blog-7934689722134345481.post-37427842383978558982019-02-20T00:38:00.000-08:002019-02-21T00:39:50.851-08:00Global cyber-attack would cost businesses billions<p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzDbi0J2oEJ1I-f_wv_ksuAd0WhdKkiX3cY6N8xZyBYy303AaaKHuBXMyHcB0GbZ5YdEk_ufSE4PjLl7kDy4xAXM1EtgUMubDTaU96vUYceALn7SFXUQFiXL3aZFfTVJIPIv2AR9ug_ATS/s1600-h/ecl+blog+55+global+cyber+attack+would+cost+businesses+billions%255B5%255D"><img width="350" height="233" title="ecl blog 55 global cyber attack would cost businesses billions" align="right" style="margin: 0px 0px 10px 30px; border: 0px currentcolor; border-image: none; float: right; display: inline; background-image: none;" alt="ecl blog 55 global cyber attack would cost businesses billions" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh263ip4wrD0YBq10jh8VrQEvabG71o0R5ZsjJhfoMw3Gy7kvuJqR7O6NapWTZrA5SFx6iDs8W44dYMc8GgtB4kIm395zz6wepGXEjR8vDscHrUrcwjZdxY9D7waFahx-JxGiP6nnqZz8lp/?imgmax=800" border="0"></a>A new report has produced findings in which it claims that a coordinated global cyber attack could cause economic damage of between £65-96 billion.<p>In the hypothetical scenario developed for Lloyds of London and Aon, <a href="https://www.lloyds.com/news-and-risk-insight/press-releases/2019/01/global-ransomware-attack">findings showed</a> that a malicious campaign similar to those of real-life ransomware (such as WannaCry and Not Petya) could spread around the world incredibly quickly and cause devastating damage in its wake. <p>The scenario involved an infected email which once opened forwards itself to all contacts. It estimated that within 24 hours, data on 30 million devices worldwide could be encrypted and business owners faced with the prospect of paying a ransom or losing their data. <p>The impact on those businesses through reduced operation, productivity, consumption, ransomware payments and disruption to the supply chain was estimated to be in the tens of billions with businesses most heavily impacted in Europe and North America. <a name='more'></a><p>The report highlighted the need among businesses to prepare for ransomware attacks. Not only in the form of insurance but also in working with IT support companies to develop strong online perimeter security. What’s more, as has been shown recently with the case of American food distributor Mondelez, insurance companies are not always willing to pay out after such an attack.<p>The food distributor, who also owns Cadbury, opened legal action against Zurich Insurance after they failed to pay out for an insurance policy which the food distributor claimed was there to cover for loss of data, software and physical damage brought about through a ransomware attack. The insurance company claimed an exclusion in their policy which made exceptions for “warlike” actions from other nation states. <p>With this in mind, it is absolutely essential that businesses have protocols in place to defend against and minimize damage from such attacks. <p>Here at ECL we have extensive experience in protecting businesses against the latest computer hacks, viruses, malware, spam, phishing scams and other threats and can advise you on the best methods of protecting your business. We can also help businesses to upgrade and run the latest and most secure versions of operating systems. For more information, please call us on 01268 575300 or email us on <a href="mailto:info@ecl.co.uk">info@ecl.co.uk</a>.ECLhttp://www.blogger.com/profile/05441693925955384687noreply@blogger.com0tag:blogger.com,1999:blog-7934689722134345481.post-20380581668937654092019-01-31T08:04:00.000-08:002019-02-20T08:05:03.759-08:00Has your email been stolen in massive data leak?<p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZQdm_LfpEGVCP3vzEcg4oQBLFWQT2u4ByfjaaLazPbEWogeqGjW3PPeZPgZdI3MDqNF8kTVnnihU4-g-FdTqbv0APUKrP-wL5n8ifct9ccUifRAUIlsTe9aB7XU55WuxAf6XcgLzoh4oQ/s1600-h/has+your+email+been+stolen+in+massive+data+leak%255B5%255D"><img width="350" height="233" title="has your email been stolen in massive data leak" align="right" style="margin: 0px 0px 10px 10px; border: 0px currentcolor; border-image: none; float: right; display: inline; background-image: none;" alt="has your email been stolen in massive data leak" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnxG7Dbnc1oTFIb-jMNVMt1CzYTGEsp4FFIG9Uudi0Frbs51ubLy1bG5VRn_0pkgtoHkdp9xjS2RkwrPt8mtH_BHQGkVeMSC2XGo_5g2Io2n_UU5VvLnHiVWNqSPY3LUV4c8tJRyL_zBbL/?imgmax=800" border="0"></a>Dubbed a ‘mega-leak’, more than 2.2 billion stolen emails and passwords have surfaced online in a leak that is growing bigger by the day. <p>First reported on January 17, 2019 by researcher Troy Hunt, the leak included an astonishing number of email addresses and password combinations. However, upon further investigation the list of breached data was even bigger than first suspected, with 2.2 billion user’s worth of data included. <p>The data is apparently an amalgamation of leaked email addresses and passwords from other various leaks in recent years (Yahoo, LinkedIn, Dropbox, etc.) bundled together in an easily downloadable package for illicit purposes. <p>It has been reported by tech website Wired that the leak is being shared among hacker circles on forums and through torrents providing what is essentially a ‘phone book’ of email address credentials. This effectively allows any would-be hacker to attempt to gain access to websites using those credentials in the hopes that the password remains unchanged. <a name='more'></a><p><b>How to check if your email has been leaked</b><p>There are a couple of ways for you to check whether your password has been leaked. <a href="https://haveibeenpwned.com/">Have I been Pwned?</a> And <a href="https://sec.hpi.de/ilc/search?">Identity Leak</a> will both cross-reference your email against the data dump to see if your email turns up. If it does then you’ve been hacked, and you should change your password on all your frequently used websites. If it doesn’t then – well, it doesn’t hurt to change your passwords anyway. <p>Businesses, organisations and individuals can protect their data by using strong passwords, keeping their patches up-to-date, using endpoint security on their systems, preventing access to unknown hosts on their servers and implementing a regular routine of data backups to prepare for the worst-case scenario.<p>Here at ECL we have extensive experience in protecting businesses against the latest malware, computer hacks, viruses, spam, phishing scams and other threats and can advise you on the best methods of protecting your business. We can also help businesses to update their systems to run the latest and most secure version of Windows available. For more information please, please call us on 01268 575300 or email us on <a href="mailto:info@ecl.co.uk">info@ecl.co.uk</a>.ECLhttp://www.blogger.com/profile/05441693925955384687noreply@blogger.com0tag:blogger.com,1999:blog-7934689722134345481.post-59800988708284368752018-12-31T08:01:00.000-08:002019-02-20T08:02:52.839-08:00Levels of hacking and phishing predicted to increase in 2019<p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu4C6Ra5kFqMPIL8wGFyg1yr2tAWhq8Pr__hCRSvXG8kruDiwTzycVyE_CnscW5E9x3iKsW4ApzTrCPzv1igzraul_jIahyphenhyphenVwqEcXFxlWp0kvdpz96UprtLwocAynSzNts2tuU3w9ARWEU/s1600-h/levels+of+hacking+and+phishing+predicted+to+increase+in+2019%255B3%255D"><img width="350" height="233" title="levels of hacking and phishing predicted to increase in 2019" align="right" style="margin: 0px 0px 10px 30px; border: 0px currentcolor; border-image: none; float: right; display: inline; background-image: none;" alt="levels of hacking and phishing predicted to increase in 2019" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEjDoV9Q2xMOfwNn3i9uXcoULcD_J6uLB1vibkk0DMnoFRD6lPnEbhUnHMWaX-QHQoXuM6wmHwKPi9Nz6gQ9kW-UWueA-wljuqkYmKuMsgZdOp8z092migtxbcfIYoMUQZHvCDkujxh98F/?imgmax=800" border="0"></a>2018 brought with it many major cyber-crime attacks over the year. <p>A number of global businesses and industries fell victim to data breaches including the likes of Facebook, Under Armour, MyHeritage and the Marriott Hotel Group – even the French President, Emmanuel Macron, had his emails hacked!<p>Together with increasing levels of ransomware and malware attacks, cyber security is rightly at the top of many business agendas in 2019. Here are what some of the world’s top experts are predicting for the year ahead. <p><b>McAfee</b><p>Leading software experts McAfee have warned that businesses may well find themselves ‘under siege’ from threats like malware, ransomware and over attacks in the coming months. They predict that criminals will turn to social media, cloud technologies and mobile phones as key windows for attacks and ‘upscale’ their efforts to bypass security controls. <a name='more'></a><p><b>Symantec</b><p>Highlighting the vulnerability of mobile and tablet devices, Symantec’s <a href="http://images.mktgassets.symantec.com/Web/Symantec/%7B3a70beb8-c55d-4516-98ed-1d0818a42661%7D_ISTR23_Main-FINAL-APR10.pdf?aid=elq_">Internet Security Threat Report</a> revealed that over 24,000 malicious mobile apps are blocked daily. Mobile devices in particular are hot property for cyber attacks due to the likelihood of sensitive data being held locally on devices. <p><b>CSO Online</b><p>CSO Online has predicted that ransomware attacks for the healthcare industry will quadruple by 2020. Misdirected faxes or email and improper release of discharge papers are a common cause of breaches in the healthcare industry, however more than 40% of breaches are now down to hacks and malware. <p><b>World Economic Forum (WEF)</b><p>A new study from the World Economic Forum described cyber attacks as the “most dangerous risk” facing UK businesses. The <a href="https://www.weforum.org/reports/the-global-risks-report-2018">Global Risks Report study of 2018</a> polled over 12,500 business executives worldwide asking them what they believed to be the biggest dangers to trading. Cyber attacks topped the poll ahead of failures of national governance, asset bubbles, fiscal crises, failures of mechanical mechanisms, terrorist attacks and failures of urban planning. <p>Here at ECL we have extensive experience in protecting businesses against the latest computer hacks, viruses, malware, spam, phishing scams and other threats and can advise you on the best methods of protecting your business. We can also help businesses to upgrade and run the latest and most secure versions of operating systems. For more information, please call us on 01268 575300 or email us on info@ecl.co.uk.ECLhttp://www.blogger.com/profile/05441693925955384687noreply@blogger.com0tag:blogger.com,1999:blog-7934689722134345481.post-11244550348769099532018-11-30T07:21:00.000-08:002018-12-05T07:25:07.469-08:006 ways to protect your business from ransomware attacks<p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7rBxoC6Z42Xq-gxL06B8SYqMlVl8eMmWcs-0CvraHOpmeJNqemq-B4toNmggQBdqX6n3r3nmGvBsCbvqcvPLC0o0JA5RSC6VMEeY_dMf-JrOAq8dH98sn_T33CBPfo7j7dPVcvFsRf4R_/s1600-h/6+ways+to+protect+your+business+from+ransomware+attacks%255B3%255D"><img width="375" height="250" title="6 ways to protect your business from ransomware attacks" align="right" style="margin: 0px 0px 10px 30px; border: 0px currentcolor; border-image: none; float: right; display: inline; background-image: none;" alt="6 ways to protect your business from ransomware attacks" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEsc-h55g4D4JoVm0fRJhaKTqzqVAZ1uOmOBqoceVu3VkARMRPqElZa6ZHHHuNOOpIT5rx36GX_mzz0GZSznuraB4BEySlGOYD03274E3wos8IKht9y8MHvSLZl7ox1MdC-RD7Rvv-4hOz/?imgmax=800" border="0"></a>A recent report from cyber security company Sophos has uncovered some disturbing trends in the advancement of online crime. The report found that teams of online criminals are now turning to targeted ransomware attacks as a means of earning millions of dollars from businesses and high-value individuals. <p>The report by SophosLabs also suggested that cyber criminals are manipulating flaws in Windows systems admin tools as a means of stealing sensitive information and of delivering ransomware. Once activated, the ransomware will cut off access either to the entire system or specific files until the user delivers a ransom payment – usually paid for in untraceable currency such as BitCoin. However, there are no guarantees that a payment will mean your data will be restored. <p>Following a string of worrying malware strains released last year such as Meltdown, Spectre, Foreshadow, Petya, NotPetya, X-bash and WannaCry, it is important that businesses have protocols in place to defend against and minimise damage carried out by a ransomware attack. Here are just a few things that you can do. <a name='more'></a><p><b>1 – Train your employees</b><p>Staff at your business should be trained to recognise the risks and dangers present on the internet. Without proper briefing and vigilance, they could easily fall victim to hacks, viruses, spam, phishing scams and other threats. <p><b>2 – Have strong Spam Filters </b><p>A common method for infecting computers is through the use of email. You should run virus scans on any attachments sent via email before opening them and should practice extra vigilance with any emails from senders that you don’t recognise. Phishing scams often imitate the domains, letterheads and other aspects of a company to make them look authentic and can be very convincing. Spam filters can cutdown somewhat on the number of unsolicited emails that you receive. <b></b><p><b>3 – Disable macro scripts </b><p>Microsoft Office can potentially be manipulated to offload ransomware on to your PC. Macros like tool bar buttons and keyboard shortcuts could offer a route in. If it’s not feasible for your business to lock them down entirely then you should utilise the Microsoft option to ‘block them in high-risk scenarios only’ such as when you download a document from the internet or open it from a third-party. <p><b>4 – Lock down administrative access</b><p>You should have different levels of access for the employees in your business. Not every employee will need to download and install programmes on your PC and unless there is a business need, they should have to request permission to do so and input a password. This gives the opportunity for someone else to take a look at what they are downloading and make sure that it is safe to be installed on your system. <p><b>5 – Software restriction </b><p>Your IT provider can set up software restriction policies which prevent programmes already installed on your network from carrying out executions from common ransomware locations such as temporary folders or compression/decompression programmes. <p>Use Software Restriction Policies to prevent programs from executing from common ransomware locations. These locations could be a temporary folder or compression/decompression programs.<p><b>6 – Regular back-ups</b><p>Having your data regularly backed up and stored offsite means that not only if there is a fire or a flood your important company files are protected, but also if you fall victim to cyber crime you can quickly and easily restore important data. <p>Here at ECL we have extensive experience in protecting businesses against the latest computer hacks, viruses, malware, spam, phishing scams and other threats and can advise you on the best methods of protecting your business. We can also help businesses to upgrade and run the latest and most secure versions of operating systems. For more information, please call us on 01268 575300 or email us on <a href="mailto:info@ecl.co.uk">info@ecl.co.uk</a>.ECLhttp://www.blogger.com/profile/05441693925955384687noreply@blogger.com0tag:blogger.com,1999:blog-7934689722134345481.post-19025396050834386782018-10-31T04:35:00.000-07:002018-11-13T03:40:13.483-08:00What are the benefits of VDI for businesses?<p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWXyiGUJaWW2t9lIbMHBO0tHnj2Io3P66fK_WmCRoQsxx3segl2DdfrF7a0YClrSoCq_w5TEg7RAv1XO7rdAVWHjOFXkv4Eo_QUDhcDbzpVjeMAsqJdwWcsMA0k5reyS0wbV35NE3Kg79M/s1600-h/what+are+the+benefits+of+vdi+for+businesses%255B5%255D"><img width="350" height="233" title="what are the benefits of vdi for businesses" align="right" style="margin: 0px 0px 10px 30px; border: 0px currentcolor; border-image: none; float: right; display: inline; background-image: none;" alt="what are the benefits of vdi for businesses" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiK81z4QXSTGRaYRjAIYvJwEDW5bTL9-EcwT41YHM6OUOhJAR99SvVmpoeQm-Nzd-lc6frLCBFuPoAcy_uXAH3nQkYWRKoi8c7QHM9UOC0ICLIwCihX6GP_izOm-vnHbPSdvKE4GO9l-PBS/?imgmax=800" border="0"></a>Virtual desktop infrastructure. Even the name itself can sound confusing. But the benefits of VDI are well worth the small amount of time it takes to understand what it is and how it works. Read on to find out more. <p><b>What is VDI?</b><p>VDI can be simply described as a type of technology that detaches the application processing from the physical computer in front of you. Rather than running applications on the computer under your desk, you will instead run them from a server that mirrors them on to your PC. <a name='more'></a><p><b>Why use it?</b><p>Well, there are various reasons as to why businesses turn to VDI. One of those is the ability to stay connected from anywhere in the world. Provided you have access to a web-browser and the internet then you can work remotely from anywhere in the world. This means that you and your employees can work from home when they aren’t needed in the office, therefore maintaining a better home/life balance, or they can work whilst out and about travelling to important client meetings. <p>Perhaps you are a start-up business that isn’t quite ready to move into a brick and mortar premises and therefore your workforce is based in multiple locations. It could even save you in times of crises. Say there is flooding at your offices, or heavy snow means your employees are unable to manage their commute to work, they are instead able to work from the safety of their homes and maintain business as usual. The reasons why you might want to use VDI really are endless. <p>Does this all sound interesting to you? If you are interested in adopting a Virtual Desktop Infrastructure solution to your business, then call us today on 01268 575300 or click here to find out more: <a href="https://www.computer-support-essex.co.uk/virtual-desktop-infrastructure.html">https://www.computer-support-essex.co.uk/virtual-desktop-infrastructure.html</a>. ECLhttp://www.blogger.com/profile/05441693925955384687noreply@blogger.com0tag:blogger.com,1999:blog-7934689722134345481.post-86467915878857656352018-09-28T09:21:00.000-07:002018-10-10T09:21:58.822-07:00What is X-bash? A look at the all-in-one malware threat<p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjki74aKDHeEmb6Xa8bf5XEgOrEJPyXUol6ft2_cdOwJ0OsEHXY9F0VYXlVCKEXQwXjDI3b491Vu0XgEIQ1_H8iP7wOUy-jZzUEeCzKRbCudMEywZoAyR0kSVqXRd_CjNAcZNFg1WMC4VG1/s1600-h/nearly+half+of+all+global+login+attempts+are+made+by+hackers%255B4%255D"><img width="350" height="234" title="nearly half of all global login attempts are made by hackers" align="right" style="margin: 0px 0px 10px 30px; border: 0px currentcolor; border-image: none; float: right; display: inline; background-image: none;" alt="nearly half of all global login attempts are made by hackers" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlXKnHrkltjV1sF_mxEEtq1lZtMZGqR3lg3OGm0vKllDl7dUxuumIdApJ_-_8ogmNXSjjhXFV7sJjRV8c272YyKBaXSBeIVQakfnG_LXjupKu2MjVIHZi8khvkQhQAmFB3z4U3WcuhR5ep/?imgmax=800" border="0"></a>Following on from headline claiming malware like Petya, NotPetya and WannaCry, a new threat to computer users has emerged in the form of an all-in-one malware called X-bash. <p><b>What is X-Bash?</b><p>Researchers at Palo Alto Networks have named this new form of malware X-bash. They claim it combines bot net, cryptocurrency mining software and ransomware in one singular worm that specifically targets users of Linux and Windows. <p><b>Who created it?</b><p>The researchers, named ‘Unit 42’, have claimed that the malware can be tied to a collective known as the Iron Group (aka Rocke), who are known to be behind numerous other ransomware attacks. <a name='more'></a><p><b>What dangers does it pose?</b><p>The first point to note is X-bash’s botnet module. This is the prime method the malware utilizes to infect new Windows and Linux systems. It searches for unpatched security holes to get on to a server and can also brute-force several web servers. <p>It also contains a worm which, while it is said to be currently inactive, does have the ability to generate a list of IP addresses on the same network it has infected and test to see if ports are open. <p>Finally, X-bash also contains two modules which are used to extort money from the infected system’s user. The ransomware module attacks Linux servers, it looks for databases, destroys them and then leaves a ransom note which asks the user to pay a financial sum through an anonymous cryptocurrency payment. Similarly, X-bash contains a cryptominer which is deployed to Windows servers. <p>Worryingly, the team at Palo Alto Networks who discovered the threat have said that they have found no evidence that X-bash contains any capabilities of restoration, meaning that even if victims pay their ransom, it is unlikely they will ever have their data restored by the hackers. <p><b>How to protect your business</b><p>Businesses, organisations and individuals can protect their data by using strong passwords, keeping their patches up-to-date, using endpoint security on their systems, preventing access to unknown hosts on their servers and implementing a regular routine of data backups to prepare for the worst-case scenario. <p>Here at ECL we have extensive experience in protecting businesses against the latest malware, computer hacks, viruses, spam, phishing scams and other threats and can advise you on the best methods of protecting your business. We can also help businesses to update their systems to run the latest and most secure version of Windows available. For more information please, please call us on 01268 575300 or email us on <a href="mailto:info@ecl.co.uk">info@ecl.co.uk</a>.ECLhttp://www.blogger.com/profile/05441693925955384687noreply@blogger.com0tag:blogger.com,1999:blog-7934689722134345481.post-84009889495586948412018-08-31T05:32:00.002-07:002018-09-11T05:33:45.318-07:00How to protect you PC from the Foreshadow Intel flaw<p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjv9n32HSS9qO0Uev9dBMqWf0-S-1Xqe6zbXnJS1lTB0JKeF422mFZL79YwwlcxCuSL40BhyphenhyphenDWLQyYAAf8mCFfHxMzd5NWFPyTkDEdg06buBbFQsKreRjLtnB21uusBEpGl9BBkH3wnAjRR/s1600-h/how+to+protect+your+pc+from+the+foreshadow+intel+flaw%255B5%255D"><img width="300" height="199" title="how to protect your pc from the foreshadow intel flaw" align="right" style="margin: 0px 0px 10px 30px; border: 0px currentcolor; border-image: none; float: right; display: inline; background-image: none;" alt="how to protect your pc from the foreshadow intel flaw" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGO85qAHHXTsoNQzW5NG_FKJ9XsIVvs56mcqF1nDeQyzWnJ44SmLsihU67BLkVO_PUOJXHiJJKFUSjR6eTfJP1CT_ekQA4fjwvfS0UvhI1smFNy-jXptKgyssj2L2k2FZ2mMzX_6KH-p-U/?imgmax=800" border="0"></a>Along with threats like Meltdown and Spectre, Foreshadow has been in the news recently, described as a worrying threat for PC’s with intel processors. <p>Meltdown and Spectre, which were first publicly disclosed in January, were a widespread problem and some of the aftermath is still being cleaned up. However, the discovery prompted researchers to do further studies into possible weaknesses and vulnerabilities, and in doing so discovered a weakness similar to Spectre in Intel processors. <a name='more'></a><p>Known as SGX, Intel’s Software Guard Extensions let programs create secure enclaves in their processors. They effectively create a space that is shut off to the rest of the system so that any malicious software stands little chance of accessing it or making changes to it. This process makes it an oasis for sensitive data to live - in theory. However, a group of researchers from global academic institutions have discovered that while SGX is effective in combating threats from the likes of Meltdown and Spectre, a similar attack called Foreshadow can get around it’s notable defenses. <p>Meltdown, Spectre and Foreshadow exploit flaws in a process called speculative execution. This is where your processer works quicker by guessing which tasks it will be asked to perform next, therefore saving valuable resources. However, investigators have discovered that the process leaves behind footprints which could be used to infiltrate systems and access sensitive data that is supposed to be safe inside SGX’s vaults. <p>We regularly offer advice on how to protect your PC and your business’ network of PC’s against the likes of Foreshadow, Spectre and Meltdown and we have similar advice here again. The best way to safeguard your systems is to have comprehensive internet security systems and procedures in place, and in particular that you stay up to date with the latest patches and updates that are released by manufacturers in response to recently discovered vulnerabilities. <p>Here at <a href="http://www.computer-support-essex.co.uk/">ECL</a> we have extensive experience in protecting businesses against the latest malware, computer hacks, viruses, spam, phishing scams and other threats and can advise you on the best methods of protecting your business. We can also help businesses to update their systems to run the latest and most secure version of Windows available. For more information please, please call us on 01268 575300 or email us on info@ecl.co.uk.ECLhttp://www.blogger.com/profile/05441693925955384687noreply@blogger.com0tag:blogger.com,1999:blog-7934689722134345481.post-18959951833300412442018-07-31T08:08:00.000-07:002018-08-02T08:09:15.772-07:00Fake News Virus Warnings<p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgG33hAUzabB4nZZf4xOdulID4lUPGWJieoXjqX4BIeSzeoXUGxUQCN-vuAh6dLNPXb4QPQjFcG5whDtOfkcDV1jmSc6BiA6-NKUAKpWQVr7u-2QNmGnx4KqvnxpgP7_ahY8tmWRNzdbR5Y/s1600-h/fake+news+virus+warnings%255B3%255D"><img width="300" height="200" title="fake news virus warnings" align="right" style="margin: 0px 0px 10px 30px; border: 0px currentcolor; border-image: none; float: right; display: inline; background-image: none;" alt="fake news virus warnings" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEw3j-KfivoA8wdbxfmVr7mcicTKvKDh-zhV4wI6IOr_BX_acbQhvkF9uY3Sva8PsujzrEU0vGcKDmbgGRa9vrJKcdF1AlGMuGiQlxm1Q_Fmwbz84iaMh94Ub1i2Vnl-aDSbdOGYnH-44E/?imgmax=800" border="0"></a>Businesses are encouraging staff to be extra-vigilant after an increase in malicious content distributed through social media. <p>Social media websites are documenting a rise in falsified articles that use notable fake news stories to encourage people to click. Once they land on the website however, they can be susceptible to a whole range of malicious content like malware and viruses. <p>Two recent examples of these hoax-type stories include an article purporting the death of popular Mr. Bean actor Rowan Atkinson and an article reporting US President Trump had suffered a stroke. The news articles are spread through social media and encourage visitors to click through to their websites. Once there, visitors can inadvertently download malware, ransomware and other dangerous viruses. <a name='more'></a><p><b>Use caution when following links</b><p>Businesses in particular are warned to be vigilant towards this type of content and ensure that not only are their staff briefed on the dangers but also that they have robust protections in place should any of their employees fail to adhere to their advice. <p>Employees should be given comprehensive training and guidelines regarding staying safe online. They should be told to only click on ‘trusted’ news sources and where possible get their news directly from the provider, instead of visiting through social media, as this avoids so-called ‘spoofing’ of URL’s. <p>It’s important to note that even with good levels of training there is still a strong chance that your business could fall victim to phishing, hacks, scams and ransomware, so as well as providing training to your employees you need to make sure that your systems are well protected with up-to-date software, firewalls and anti-virus programs. <p>Here at <a href="http://www.computer-support-essex.co.uk/">ECL</a> we have extensive experience in protecting businesses against the latest malware, computer hacks, viruses, spam, phishing scams and other threats and can advise you on the best methods of protecting your business. We can also help businesses to update their systems to run the latest and most secure version of Windows available. For more information please, please call us on 01268 575300 or email us on info@ecl.co.uk.ECLhttp://www.blogger.com/profile/05441693925955384687noreply@blogger.com0tag:blogger.com,1999:blog-7934689722134345481.post-76468633164709267842018-06-29T01:37:00.000-07:002018-07-05T01:38:38.598-07:00How to transform your workforce in one easy step<p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjw4d6IEearWo-ZmQGHxI5atPtqPhK1UQbJluVixkwGIrRoez3XyMeS1dj5DFrU7gmvt0Ewu8YiDXKOR6AVKKsggD5oersUMOBsHGTkP9ZgW5Bf7h54GDnc_M2jsPvxpqn1oqqI7ObU_I-t/s1600-h/how+to+transform+your+workforce+in+one+easy+step%255B3%255D"><img width="400" height="262" title="how to transform your workforce in one easy step" align="right" style="margin: 0px 0px 10px 30px; border: 0px currentcolor; border-image: none; float: right; display: inline; background-image: none;" alt="how to transform your workforce in one easy step" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhymv6w_uq4LNj_JTCmN7Xrpxqr55aaxUE6cJvR0UODm5myM155oIRWuI6RyfHkaPb-sQzBMQRKADZ9_rqv-7mOQkYyDjM0mEabmfRkokIF0wCz1bDteLJJFUY3E8DG9ysHuUpytvOY-bDH/?imgmax=800" border="0"></a>Technology is rapidly changing the way that we work. From industry giants to young and hungry start-ups, modern devices, programs, tools, systems and support is enabling businesses to thrive in an ever-changing market place. <p>One of the biggest changes has come in the form of not only how we work but also the way we work. While many businesses have traditionally operated out of office-style set ups, following the usual 9-5, Monday to Friday shift patterns, over the past decade a radical shift has begun to take place. <a name='more'></a><p><b>Flexible working arrangements </b><p>Many industry leaders have begun to adopt flexible working arrangements, allowing employees to have a degree of say over how, where and when they work. This could involve working from home, working part-time hours, sharing jobs or having flexi-time arrangements that fit around their lifestyle and out-of-work commitments. Although many business owners have reservations about these non-traditional set-ups, the benefits begin to speak for themselves, with increased employee engagement and maximised performance just two of the benefits on offer to businesses willing to take a leap of faith. <p>Whether an employee is seeking a better work-life balance, is trying to work out their childcare arrangements, is a carer or has their own health problems, it is important that employees feel supported in order to not only keep them as loyal workers, but also to keep them motivated and engaged. <p><b>Staying connected </b><p>Flexible working is not without its hurdles though and one of the cornerstones of a successful arrangement is cloud technology. Cloud technology allows users to access data through internet connectivity rather than simply through their hard drive. This means that they can access important work-related files from home, in the airport, or hotel whilst on business or wherever else they require it. Furthermore, cloud computing also provides robust protection against data failure, or disasters such as fires and flooding at your offices as data is updated in real time. <p>Here at ECL we have our own ECL private cloud located in a highly secure UK datacentre. We offer online data backups, fully working replicas of your in-house systems as part of DR planning, virtualization of your existing elderly or unreliable systems, the option to run your existing VMware or HyperV virtual servers from our cloud, remote desktop access with fast upload speeds, a fully hosted virtual infrastructure and a committed and personal service. <p>For more information about what <a href="https://www.computer-support-essex.co.uk/ecl-private-cloud.html">cloud computing</a> can offer you please call us on 01268 575300 or email us on info@ecl.co.ukECLhttp://www.blogger.com/profile/05441693925955384687noreply@blogger.com0tag:blogger.com,1999:blog-7934689722134345481.post-216739737970384932018-05-30T01:54:00.000-07:002018-05-31T01:57:16.589-07:004 reasons for start-ups to outsource IT support<p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcBgGWV8bLnfFfgDZ45StRYWgj8TYsYO80GJjTfCPdezAE3FfjjMmRrPLcQy2J4JH_zhCLsBTfPXiFsBGkq3d1_N5e9fevFYDKl2MHn9XDpluBPDmeKncf14lRY6J0VynA5IgqIEZ9UXT5/s1600-h/4+reasons+for+start-ups+to+outsource+it+support%255B3%255D"><img width="300" height="200" title="4 reasons for start-ups to outsource it support" align="right" style="margin: 0px 0px 10px 10px; border: 0px currentcolor; border-image: none; float: right; display: inline; background-image: none;" alt="4 reasons for start-ups to outsource it support" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7hCH8lWt4RMm35TH7KcPAWEqWmxTY4Vhi8MjTOlbZ8UcX06WhfWydlL3wB_pombU-MXSwAh8QQouCPfhYhT8qKuscQESpqPpFO21B6YtjBTsBmw0J5gsokx2IVfF_skhZqdjrUU1as6L0/?imgmax=800" border="0"></a>Outsourcing is common place in the business world. Take a look at some of the biggest Fortune 500 companies like IBM and Siemens, both of whom benefit from the knowledge and expertise of other businesses to help them maintain their high standards of operation. However, outsourcing isn’t and shouldn’t be restricted to only those businesses who have already established themselves. Here are a few reasons why start-ups should also consider outsourcing certain duties such as IT support. <p><b>Cost<br></b>One of the key reasons for start-ups to outsource specific tasks such as IT support is their size. Start ups are typically keen to maintain a small and lean workforce in order to grow. This means that bringing on board their own IT specialist and paying their annual salary can needlessly bloat costs. It often makes more sense to rely on a support company who can provide assistance as and when they are needed. <a name='more'></a><p><b>Expert attention<br></b>Adaptability is a great skill to have. Entrepreneurs often excel in turning their hand to a variety of different jobs and can teach themselves the nuances of different aspects of running a business. However, some jobs are best left to the experts. The world of IT is changing every day and with new technology, and new dangers, on the horizon it’s important that you are able to keep up with what’s what. A dedicated IT support company is constantly on a learning curve, sharing knowledge with each other, trouble-shooting and gaining hands on experience that they can use to the benefit of their clients. Many start-up owners on the other hand find that taking a DIY approach to the world of IT often causes more headaches than it’s worth. <p><b></b><p><b></b><p><b>Scalability<br></b>The trajectory of a start-up can be quite unpredictable. Bloated teams and expensive salaried employees mean that when it comes to tightening your belt there can be difficult decisions to be made. A good IT support service will be able to support you throughout your journey and be ready to offer you even more support should your business begin to take off and scale back when needed. <p><b>Security <br></b>As we mentioned in a <a href="http://blog.computer-support-essex.co.uk/2018/03/british-businesses-warned-to-stay.html" target="_blank">recent blog</a>, malware, viruses and hacking attempts are a very real threat to UK businesses. In fact, it’s been estimated that there are almost 40 attacks every day on businesses in Great Britain. With this in mind, it’s absolutely integral that start-ups take their internet security seriously and stay up-to-date with the latest threats. By outsourcing your IT support to a well-respected company, you can sleep safe in the knowledge that your systems are well protected. <p>IT support is essential to a business, no matter the size. Here at <a href="http://www.computer-support-essex.co.uk/" target="_blank">ECL</a> we provide a range of IT support agreements at highly competitive rates including fixed-fee rolling monthly agreements with no long-term tie-in’s. To find out more please contact us on 01268 575300.ECLhttp://www.blogger.com/profile/05441693925955384687noreply@blogger.com0