Blog Large

PassW0rds the barrier and the way into your organisation.

Password Security Passwords, normally in conjunction with a User identity (userid), have been in use for as long as we have had access to computers. While they are far from a perfect system of providing a unique identification for access to resources and have a number of weaknesses, they are almost universally used, commonly accepted and unlikely to be replaced with anything else in the foreseeable future. So what makes a good password? The advice varies. Ideally they should be sufficiently stro ...

Making your business secure.

Tips for improving information security and Resilience Security must be a business enabler, not prevent it. Security is everyone’s responsibility, so provide awareness sessions and teach the basics again and again. Educate your staff about what is expected of them, such as good password security, for example using strong passwords and never using the same password twice, and that they should be aware that when they put information online, they can never be sure that it will remain pr ...

Data backups.

How Do I Create a Backup of My Computer? The first question is perhaps ‘why do I need to make a backup?’  Well the answer to that will vary.  If you store nothing that has any value on your computer and have the installation disks (you remember, those disks that came with the computer when you first got it), then you may not need to bother. Unfortunately, whether it is our own home computer or it belongs to the organisation that you work for, it is rare that there is nothing of value store ...

Malicious Software and how to protect yourselves from it.

What is Malicious Software? Malicious Software, also known as malware is any software that is designed to intentionally cause damage to a computer, server, or computer network. It comes in many forms including computer viruses, worms, Trojan horses, ransomware, spyware, adware, and scareware, among others. Malware, in its various forms, may encrypt or corrupt files and erase data, steal passwords or data, log keystrokes, track browsing habits to spam the email contacts of the user, dep ...