Phishing in the time of coronavirus

Grant McGregor has written extensively on this blog about the growing risk from phishing, spear phishing and social engineering. Now, experts warn these risks have got an extra boost from the coronavirus pandemic.
In April 2020, the UK’s National Cyber Security Centre (NCSC) launched a campaign to raise awareness of the increased threat from cybercrime during the COVID-19 pandemic.
In doing so, it highlighted its concern that criminals could seek to capitalise on the increased use of Internet-enabled devices.
The NCSC’s response to coronavirus-related cybercrime
As part of the campaign, the NCSC launched a new suspicious email reporting service.
At the same time, it announced that it had already:
• Taken down 471 fake online shops selling fraudulent “coronavirus related” items
• Removed 555 malware distribution sites
• Removed 200 phishing sites designed to capture password and credit card details
• Closed down 832 “advance-fee frauds” whereby a large sum of money is promised in return for a set-up payment.
However, the NCSC makes it clear that cyber criminals are continuing to use the pandemic as an opportunity to play on peoples fears and desire for information and exploit it for their own financial gain.
How to spot a coronavirus-related phishing email
The security company Norton has published a blog which identifies some of the phishing approaches being used by cyber criminals in the wake of the pandemic.
These include:
• Email messages that include an invitation to open an attachment to see the latest COVID-19 statistics for your area, but if you click on the embedded link or attachment, you download malicious software to your device.
• Email messages that offer a novel cure or way to protect yourself against the virus. Norton gives the example of one email that claimed “This little measure can save you”
• Email messages that replicate an internal company communication and include a link to a new company policy about safety precautions. When you click on the “company policy” you download malicious software.
One reason the coronavirus is such a tempting ploy for the cyber criminals is because it offers an ideal opportunity to trade on one of their favourite devices: the creation of a sense of urgency.
How to respond to a fake sense of urgency
Manufacturing a sense of urgency works because it can pressurise email recipients to make a bad decision.
If you feel pressured by an email to act upon it, this is a major warning flag that you might be dealing with a phishing attempt.
Take a step back: no matter how urgent it seems don’t be tempted to act on it immediately.
If possible, confirm the information in the email or reach out to the recipient in another way.
Don’t use the link in the email: find the website address for yourself. Or better, pick up the phone and speak with the person involved.
The growing risk of cyber crime
Trend Micro has also reported a rise in coronavirus-related cybercrime.
In its first-quarter Smart Protection Network survey, it says it has detected 737 different malware related to COVID-19 between January 1, 2020 and March 31, 2020. The company reports 907 thousand spam messages related to COVID-19 over the same period and a 220-times increase in spam from February to March. In particular, it highlights the risk of a coronavirus-themed ransomware.
KPMG warns of further scams
Further coronavirus-related cybercrime activity has been identified by consulting company KPMG. It has highlighted several scams:
• COVID-19 themed spear-phishing attempts
• COVID-19 phishing emails with macro-enabled Word documents which download Emotet or Trickbot malware
• Phishing emails purporting to come from the World Health Organisation
• COVID-19 tax rebate lures which direct recipients to a fake website that captures financial and tax information
The NCSC guidance
As part of its campaign, the NCSC published five simple steps that everyone should be taking to protect themselves online:
• Turn on two-factor authentication
• Protect accounts using a password of three random words
• Create a separate password that you use only for your main email account
• Update the software and apps regularly
• Protect yourself from being held to ransom by backing up important data
Are you doing enough to protect your staff from phishing?
As well as implementing sensible precautions such as email filtering and two-factor authentication, staff need to be empowered to spot phishing attempts.
At this time, it’s really important to make sure all your staff understand there is an increased risk of cybercrime during this period, especially with a coronavirus theme.
At the same time as you communicate this message, it’s worth reminding staff of the precautions they can take to protect themselves from phishing attacks:
• Use strong passwords, especially for key accounts such as Office 365 access
• Look out for spelling and/or grammatical mistakes – these can indicate spam or phishing content
• Beware of online requests for personal or financial information
• Be wary of emails that insist you act immediately
• Confirm requests for information using a different channel (e.g. by phone or Teams messaging)
• Check email addresses and links before clicking on them
You can read more about phishing red flags here on our blog.
To find out what you can do to support staff, please speak with the Grant McGregor team. We’re always on hand to offer expert help and advice and more than happy to talk you through security approaches and solutions or staff training to help you to neutralise the threat of cybercrime.
Like this article? Share it:
Pegasus CouriersJust wanted to say a big thank you to Dan for his help today. Above and beyond and very patient with a beginner like me.
- Read in full
Daniel Floyd, Pegasus Couriers
Categories
- Uncategorized (256)
- IT Security (200)
- IT Support (159)
- IT Service (145)
- Advisory Guide (92)
- Cyber Security (90)
- IT Consultancy (81)
- IT security (73)
- Managed IT Services (68)
- IT System Upgrade (66)
- IT Outsourcing (52)
- Microsoft (49)
- Cyber Essentials (45)
- Cloud Services (44)
- Grant McGregor (42)
- GDPR (38)
- security (37)
- IT support edinburgh (36)
- IT Equipment Supply (28)
- IT Project Delivery (28)
- technology (28)
- Grant McGregor Edinburgh (25)
- GFI Software (24)
- IT Audit (24)
- Network Management (23)
- Partner News (23)
- staff training (23)
- Cyber Essentials Plus (22)
- About Us (21)
- disaster recovery (21)
- Back Up (20)
- Client (19)
- Cyber Attack (19)
- Data Leak Prevention (19)
- 2FA (18)
- data breach (18)
- Malware (17)
- Office 365 (17)
- password protection (17)
- ransomware (17)
- two-factor authentication (17)
- GFI Cloud (16)
- GFI LanGuard (16)
- cybersecurity (16)
- social meda (16)
- social media (16)
- Edinburgh (15)
- phishing (15)
- Business (14)
- Cyber Essentials Certification (14)
- Grant McGregor IT (14)
- ICO (14)
- IT strategy (14)
- spear-phishing (14)
- Collaboration (13)
- EndPoint Security (13)
- Windows 10 (13)
- BYOD (12)
- GFI WebMonitor (12)
- Microsoft Office 365 (12)
- Microsoft Teams (12)
- SME (12)
- encryption (12)
- hackers (11)
- Cyber attacks (10)
- IT (10)
- NCSC (10)
- data security (10)
- mobile device management (10)
- productivity (10)
- updates (10)
- IT strategy guide (9)
- MFA (9)
- Windows 7 (9)
- Cyber Essentials Scheme (8)
- Information Commissioner's Office (8)
- Patch Management (8)
- The Cloud (8)
- backups (8)
- data (8)
- multi factor authentication (8)
- passwords (8)
- phishing attack (8)
- phishing attacks (8)
- remote working (8)
- CEO fraud (7)
- Cloud services (7)
- Email (7)
- GFI (7)
- GM Cyber Aware (7)
- IASME (7)
- IT Software and Solutions (7)
- IoT (7)
- Password Management (7)
- WhatsUp Gold (7)
- business continuity (7)
- cyber crime (7)
- cyber threats (7)
- cybercrime (7)
- data protection (7)
- personal data (7)
- security awareness training (7)
- Better IT Support Services (6)
- CE (6)
- Cloud (6)
- General Data Protection Regulation (6)
- IT provider (6)
- SharePoint (6)
- VPN (6)
- Virtualisation (6)
- software updates (6)
- spam (6)
- upgrade (6)
- working from home (6)
- Email filtering (5)
- GFI EventsManager (5)
- IT Edinburgh (5)
- IT Management (5)
- IT Services (5)
- IT Support Advice (5)
- IT partner (5)
- Job Opportunities (5)
- MDM (5)
- O365 (5)
- Recovery Point Objective (5)
- SMEs (5)
- SaaS (5)
- Web Filtering (5)
- anti-virus (5)
- backup (5)
- benefits (5)
- brexit (5)
- cyber security training (5)
- disaster recovery plan (5)
- internet of things (5)
- managed service provider (5)
- outsourcing (5)
- password security (5)
- patching (5)
- security measures (5)
- social engineering (5)
- viruses (5)
- Anti-Vitus Software (4)
- Apple (4)
- Application Performance Monitoring (4)
- BCDR (4)
- BCDR plan (4)
- Bring Your Own Device (4)
- Email Security (4)
- Excel (4)
- GFI EndPoint Security (4)
- GFI VIPRE (4)
- Grant McGregor Ltd (4)
- IT Guide (4)
- IT security Edinburgh (4)
- IaaS (4)
- LinkedIn (4)
- MSP (4)
- Meet Your Team (4)
- Microsoft 365 (4)
- PowerPoint (4)
- RPO (4)
- RTO (4)
- SMB (4)
- WFH (4)
- access control (4)
- business continuity plan (4)
- compliance (4)
- cyber security awareness training (4)
- cybersecurity training (4)
- data backup (4)
- human firewall (4)
- marketing (4)
- phishing scams (4)
- protect your data (4)
- recovery (4)
- secure data (4)
- security policy (4)
- security risk (4)
- security updates (4)
- software (4)
- strong passwords (4)
- AI (3)
- Active Discovery (3)
- Award (3)
- Azure (3)
- Cloud storage (3)
- Cyber Essentials Certifying Body (3)
- EU (3)
- Email Management (3)
- Facebook (3)
- GFI Wireless Sentry (3)
- HR (3)
- ISO 27001 (3)
- IT Infrastructure (3)
- IT Solutions (3)
- IT estate (3)
- IT housekeeping (3)
- IT manager (3)
- IT project delivery (3)
- IT strategy development (3)
- IT support services (3)
- IT upgrade (3)
- IT vulnerabilities (3)
- Instagram (3)
- Laptop backup (3)
- LogicNow (3)
- Microsoft Intune (3)
- Microsoft Office (3)
- Microsoft Teams Guide (3)
- Network Monitoring (3)
- Network Security (3)
- OneDrive (3)
- Outlook (3)
- Outsourced IT (3)
- Password (3)
- RDS (3)
- Recovery Time Objective (3)
- Remote technology (3)
- Security Breach (3)
- Server Virtualisation (3)
- Small Businesses (3)
- Twitter (3)
- Windows 8 (3)
- Word (3)
- antivirus (3)
- apps (3)
- business owner (3)
- co-sourcing (3)
- connectivity (3)
- covid-19 (3)
- customer data (3)
- customer service (3)
- cyber criminals (3)
- data breaches (3)
- data management (3)
- data recovery (3)
- employee training (3)
- five-step IT strategy guide (3)
- free IT guide (3)
- hardware (3)
- information asset register (3)
- mobile devices (3)
- patches (3)
- phishing emails (3)
- remote access (3)
- security patches (3)
- security software (3)
- software update (3)
- solutions (3)
- stolen laptop (3)
- storage (3)
- teamwork (3)
- testing (3)
- upgrades (3)
- 12 step cyber security checklist (2)
- 2-factor authentication (2)
- 24/7 monitoring (2)
- 3D printing (2)
- Award winning product (2)
- Axcient (2)
- BYOD policy (2)
- Back-up Recovery (2)
- Carphone Warehouse (2)
- Centre (2)
- Cloud back-up (2)
- Cloudfinder (2)
- Competitive Advantage (2)
- Computer Security Awards (2)
- Cross-Site Scripting (2)
- Cyber Essentials Certificate (2)
- Cyber Essentials Edinburgh (2)
- Cyber Essentials security standard (2)
- Cyber Essentials vouchers (2)
- CyberEssentials (2)
- DUO (2)
- DUO solution (2)
- Data Protection Officer (2)
- Datto (2)
- Employee Monitoring (2)
- End Point Security (2)
- GDPR compliance (2)
- GFI Archiver (2)
- GFI Events Manager 2013 (2)
- Google (2)
- Government Security Standard (2)
- IASME accreditation (2)
- IP address locking (2)
- IT Services Guide (2)
- IT Software (2)
- IT Support Company (2)
- IT Support Partner (2)
- IT Systems Upgrade (2)
- IT activity (2)
- IT appraisal (2)
- IT expenditure (2)
- IT guide Grant McGregor (2)
- IT managers (2)
- IT network (2)
- IT plan (2)
- IT policies (2)
- IT predictions (2)
- IT process (2)
- IT refresh (2)
- IT refresh strategy (2)
- IT security concerns (2)
- IT security policy (2)
- IT strategies (2)
- IT support Scotland (2)
- Internet Explorer (2)
- Internet Explorer end of life (2)
- Internet connection (2)
- Ipswitch (2)
- LFI (2)
- Layered Security (2)
- Local File Inclusion (2)
- Lost Email (2)
- MAX MailProtection (2)
- Microsoft Azure (2)
- Microsoft SharePoint (2)
- Microsoft Windows 10 (2)
- Missing Email (2)
- National Cyber Security (2)
- National Cyber Security Centre (2)
- OWASP (2)
- Office 2010 (2)
- Office Move (2)
- OneNote (2)
- PaaS (2)
- QuickBooks (2)
- RFI (2)
- Remote Desktop Services (2)
- Remote File Inclusion (2)
- Robotic process automation (2)
- SQL injection (2)
- SQLi (2)
- SharePoint Online (2)
- UK businesses (2)
- Virtual Private Networks (2)
- WannaCry virus (2)
- Web Security (2)
- Windows (2)
- Windows 7 end of life (2)
- Windows 8.1 (2)
- Windows Server 2008 R2 end of life (2)
- XSS (2)
- Zero 2 Hero (2)
- adware (2)
- anti-spam (2)
- anti-virus protection (2)
- anti-virus software (2)
- antimalware (2)
- applications (2)
- are your web applications secure? secure websites (2)
- auditing (2)
- backup software (2)
- backup solutions (2)
- bad weather (2)
- bank statements (2)
- best practice password security (2)
- browsing online safely (2)
- brute-force protection (2)
- business data (2)
- business network (2)
- business protection (2)
- business security (2)
- business strategy (2)
- captcha code (2)
- choosing an IT partner (2)
- cloud backup (2)
- cloud backup free trial (2)
- cloud migration (2)
- cloud technologies (2)
- collaboration tools (2)
- communication (2)
- complex password (2)
- confidential information (2)
- connections (2)
- contingency plan (2)
- control access (2)
- coronavirus (2)
- corporate owned devices (2)
- cost of poor IT support (2)
- costs (2)
- critical vulnerabilities (2)
- customer feedback (2)
- cyber essentials plus certification (2)
- cyber security controls (2)
- cybercriminals (2)
- dark net (2)
- dark web (2)
- data handling practices (2)
- data hygiene (2)
- data integrity (2)
- data privacy (2)
- easy steps (2)
- education (2)
- effective IT strategy (2)
- email archiving (2)
- email scams (2)
- employee absence (2)
- employees (2)
- employer brand (2)
- features (2)
- firewall (2)
- firewalls (2)
- flexibility (2)
- free Cyber Essentials guide (2)
- free IT strategy guide (2)
- free guide (2)
- guide (2)
- hacking (2)
- help guide (2)
- hidden costs (2)
- hiring staff (2)
- home working (2)
- iPad (2)
- insider threat (2)
- install security patches (2)
- locally hosted software (2)
- lock devices (2)
- log out of accounts (2)
- malware attack (2)
- mobile security (2)
- mobile technology (2)
- monitoring user accounts (2)
- multifactor authentication (2)
- multiple verification (2)
- network (2)
- new WFH rules (2)
- organise (2)
- out of office (2)
- out-of-date software (2)
- parental controls (2)
- password lockout (2)
- password policy (2)
- phishing email (2)
- plan your handovers (2)
- planning (2)
- points of failure (2)
- prevent data breach (2)
- privacy settings (2)
- proactive approach to IT (2)
- project management (2)
- protect devices while on holiday (2)
- protect your devices (2)
- protection (2)
- ransomware attack (2)
- ransomware protection (2)
- reactive IT (2)
- recruitment (2)
- reduce threats (2)
- reputable retailers (2)
- restore (2)
- return to operation (2)
- review user access rights (2)
- router (2)
- safeguard your childrens devices (2)
- secure passwords (2)
- secure payment pages (2)
- secure remote connectivity solutions (2)
- secure web applications (2)
- secure your IT (2)
- secure your devices (2)
- security assessment (2)
- security best practice (2)
- security policies (2)
- security procedures (2)
- security risks (2)
- security standards (2)
- security vulnerabilities (2)
- security while on holiday (2)
- shop safely (2)
- social attack vendors (2)
- social media phishing (2)
- software patches (2)
- software up to date (2)
- spam filters (2)
- spring clean (2)
- spyware (2)
- staff cyber security training (2)
- stolen phone (2)
- strategy development (2)
- stronger passwords (2)
- summer holidays (2)
- switch IT provider (2)
- switch to Microsoft Teams (2)
- technological change (2)
- technology solutions (2)
- templates (2)
- trusted partner (2)
- two-step verification (2)
- unsecured networks (2)
- update software (2)
- upgrade to Windows 10 (2)
- user account management (2)
- user account permissions (2)
- user accounts (2)
- user error (2)
- user management best practice (2)
- virtualisation (2)
- vulnerabilities (2)
- web app software (2)
- web application vulnerability (2)
- website (2)
- website security (2)
- windows 7 upgrade (2)
- windows vista (2)
- wireless (2)
- worms (2)
- 2016 technology trends (1)
- 2019 (1)
- 2019 MSP 501 winners (1)
- 2019 tech trends (1)
- 24/7 Monitoring/ Educating employees (1)
- 25th May 2018 (1)
- 29th July 2015 (1)
- 2FA in workplace (1)
- 365 Availability (1)
- 5 step guide (1)
- 5G development (1)
- 6 secrets of IT support (1)
- 7-step plan (1)
- ALTO (1)
- AMD (1)
- AR (1)
- ARM (1)
- AWS Amazon Web Service (1)
- About (1)
- Accounts Systems (1)
- Activity API (1)
- Adobe Acrobat Reader DC (1)
- Alter 'mark as read' (1)
- Android (1)
- App Control (1)
- Archiver (1)
- Are you doing enough to protect your data? (1)
- Article 17 (1)
- Augmented Reality (1)
- Axcient x360 Cloud (1)
- Axcient x360Cloud (1)
- B2B (1)
- B2B marketing (1)
- BCDR solutions (1)
- BCDR test (1)
- BDR (1)
- Bad Romance (1)
- Baillie Signs (1)
- Basecamp (1)
- Best UK GFI Partner (1)
- BitDefender (1)
- BitDefender Gravity Zone (1)
- BitDefender features (1)
- Brexit deal (1)
- British businesses (1)
- Business Internet Usage (1)
- Business Premium (1)
- Business goals (1)
- Buy GFI LanGuard (1)
- CE Certifying Body (1)
- CE Trusted Partner (1)
- CE certificate (1)
- CE voucher deadline (1)
- CE vouchers for charities (1)
- CEO scam (1)
- CEOs (1)
- CIO (1)
- CMDB (1)
- CPU (1)
- CPU bugs (1)
- CRM (1)
- CRM online (1)
- CRM software (1)
- CRM system (1)
- CSAT (1)
- California Consumer Privacy Act (1)
- Calling Last Orders on Windows 7 (1)
- Cambridge Analytica scandal (1)
- Canyoning (1)
- Car livery (1)
- Carphone Warehouse data breach (1)
- Carphone Warehouse fine (1)
- Central Belt (1)
- Central Scotland (1)
- Change Configuration Management (1)
- Channel Futures MSP 501 rankings (1)
- Chief Information Officer (1)
- Christmas (1)
- Cloud adoption (1)
- Cloud service provider (1)
- CoAuthoring (1)
- Community Partner (1)
- Computer (1)
- Containers (1)
- ControlNow (1)
- CrySiS (1)
- CryptON (1)
- CryptoLocker (1)
- Crystal Ball (1)
- Customer Satisfaction (1)
- Cyber Essentials Scotland (1)
- Cyber Essentials Security Accreditation (1)
- Cyber Essentials event (1)
- Cyber Essentials event Edinburgh (1)
- Cyber Essentials for business (1)
- Cyber Essentials guide (1)
- Cyber Essentials information (1)
- Cyber Essentials standard (1)
- Cyber Essentials voucher (1)
- Cyber Essentials voucher scheme (1)
- Cyber Voucher (1)
- DDOS (1)
- DDoS attacks (1)
- DDos attachks (1)
- DDos protection (1)
- DLP (1)
- DPIA (1)
- DPO (1)
- Data Protection Act (1)
- Data Protection Act 1988 (1)
- Data Protection Act 2018 (1)
- Data Protection Impact Assessments (1)
- David Lawrence (1)
- Delve (1)
- Desktop (1)
- Directors (1)
- Dixons (1)
- Docker Support (1)
- Download GFI LanGuard (1)
- Dynamics (1)
- EMM (1)
- EU citizens data (1)
- EU legislation (1)
- EU standard (1)
- Edinburgh Evening News (1)
- Edinburgh IT company (1)
- Endpoint Manager (1)
- Enterprise Mobility Management (1)
- Enterprise Resource Planning (1)
- Eurofins (1)
- Eurofins ransomware (1)
- European Union (1)
- European Union legislation (1)
- Exchange 2010 (1)
- Exchange Online (1)
- External Hard Drives (1)
- Fife (1)
- Fifty Five and Five (1)
- Find My Device (1)
- Find my iPhone (1)
- Firefox (1)
- Fraud Prevention (1)
- Free Webinar (1)
- Freshbooks (1)
- GDPR aftermath (1)
- GDPR compliance Cyber Essentials (1)
- GDPR customer relationship (1)
- GDPR deadline (1)
- GDPR fines (1)
- GDPR privacy notice (1)
- GDPR standards (1)
- GDPR what's next (1)
- GDPR-compliant (1)
- GFI Events Manager (1)
- GFI LanGard (1)
- GFI LanGuard Review (1)
- GFI MAX (1)
- GFI MailEssentials (1)
- GFI Viper (1)
- GM MDM (1)
- General Data Protection Regulations (GDPR) (1)
- Glasgow (1)
- GoCo (1)
- Google Chrome (1)
- Government-backed Cyber Essentials (1)
- Grant McGrego (1)
- Grant McGregor Christmas opening times (1)
- Grant McGregor IT Strategy Guide (1)
- Grant McGregor team (1)
- Grant McGregor top MSP (1)
- Grovo (1)
- HDD (1)
- Happy New Year (1)
- Hootsuite (1)
- Host Gardian Service (1)
- Hosted Services (1)
- HubSpot (1)
- Human Rights Act (1)
- IAR (1)
- IASME Gold (1)
- IASME Governance (1)
- IASME Governance standard (1)
- IBC (1)
- ICI (1)
- IE10 (1)
- IE11 (1)
- ISMS (1)
- ISO/IEC 27018 (1)
- ISP (1)
- IT Jobs Scotland (1)
- IT SOPs (1)
- IT Security Standard (1)
- IT Security breaches (1)
- IT Services Company (1)
- IT Services company in Edinburgh (1)
- IT Suppor Provider (1)
- IT Support Job Edinburgh (1)
- IT Support Provider (1)
- IT Support Technician (1)
- IT Systems Audit (1)
- IT advisory guide (1)
- IT asset list (1)
- IT audit and appraisal (1)
- IT audits (1)
- IT change (1)
- IT cleanse (1)
- IT collaboration (1)
- IT companies Edinburgh (1)
- IT company (1)
- IT company Edinburgh (1)
- IT consultanc (1)
- IT education (1)
- IT equipment (1)
- IT equipment replacement (1)
- IT error (1)
- IT expertise (1)
- IT issues (1)
- IT lifecycle (1)
- IT maintenence (1)
- IT operations (1)
- IT outsource supplier (1)
- IT partnership (1)
- IT perimeter (1)
- IT planning (1)
- IT predictions for 2018 (1)
- IT productivity (1)
- IT professional (1)
- IT provider Edinburgh (1)
- IT provider warning signs (1)
- IT refresh policy (1)
- IT security awareness training (1)
- IT security risks (1)
- IT security services (1)
- IT security threat (1)
- IT security threats (1)
- IT service Edinburgh (1)
- IT service management (1)
- IT service provider (1)
- IT services partner (1)
- IT spend (1)
- IT spending (1)
- IT spring clean (1)
- IT staff (1)
- IT strategy for SMEs (1)
- IT strategy plan (1)
- IT supplier (1)
- IT support company edinburgh (1)
- IT support cost (1)
- IT support outsourcing edinburgh (1)
- IT support price (1)
- IT support service edinburgh (1)
- IT system (1)
- IT system audit (1)
- IT systems (1)
- IT systems update (1)
- IT team (1)
- IT training (1)
- IT trends (1)
- IT upgrades (1)
- IaaS Infrastructure as a Service (1)
- Incident and Problem Management procedure (1)
- Increased Email Size (1)
- Information Commisioner's Office (1)
- Information Commissioner (1)
- Information Security Management (1)
- Information Security Management System (1)
- Information Security System Audit (1)
- Intel (1)
- Intelligent Business Continity (1)
- International Electrotechnical Commission's standa (1)
- Internet Bandwidth (1)
- Internet Explorer 10 (1)
- Internet Explorer 11 (1)
- Internet Service Provider (ISP) (1)
- Internet traffic (1)
- IoT security (1)
- Is it time you outsourced your IT? (1)
- It nightmares (1)
- January sales (1)
- John Aithie (1)
- KTwo (1)
- Kevin Mitnick (1)
- Keyboard shortcuts (1)
- LOGICcards (1)
- Laptop data (1)
- Lothian (1)
- Luminous Creative (1)
- MAX Backup & Disaster Recovery (1)
- MAX Mail (1)
- MAX Remote Management (1)
- MAX Risk Intelligence (1)
- MAX Service Desk (1)
- MDM software (1)
- MDM solution (1)
- MDM strategy (1)
- ML technologies (1)
- MOVEit (1)
- MOVEit Transfer (1)
- MSP Edinburgh (1)
- Magento security breach (1)
- Managed Antivirus (1)
- Managed IT Support (1)
- Managed Service Providers (1)
- Managed Web Protection (1)
- Meltdown (1)
- Mention (1)
- Microsoft Authorized Education Reseller (1)
- Microsoft Business (1)
- Microsoft Cloud Services Partner (1)
- Microsoft Defender (1)
- Microsoft Edge (1)
- Microsoft Graph (1)
- Microsoft Home (1)
- Microsoft Office 365 subscription model (1)
- Microsoft Project (1)
- Microsoft Publisher (1)
- Microsoft RDP (1)
- Microsoft Word (1)
- Microsoft backup (1)
- Microsoft operating system (1)
- Microsoft outlook (1)
- Microsoft partner (1)
- Microsoft products (1)
- Microsoft subscription (1)
- Microsoft subscription price (1)
- Microsoft suite (1)
- Microsoft technical support (1)
- Microsoft upgrades (1)
- Midlothian (1)
- Modular technology (1)
- Monitoring Software (1)
- Multi-party HD Video Conferencing (1)
- NCA (1)
- NCSC report (1)
- NHS cyber attack (1)
- Nae Limits (1)
- Nano Server (1)
- Nested Virtualisation (1)
- O365 price (1)
- O365 subscription (1)
- OS upgrades (1)
- Office (1)
- Office 365 advantages (1)
- Office 365 for home business and students (1)
- Office 365 packages (1)
- Office 365 vulnerabilities (1)
- Office applications (1)
- OneDrive for Business sync (1)
- Our Clients (1)
- PC (1)
- PC breakdown (1)
- PC cost (1)
- PC hardware (1)
- PC issues (1)
- PCs (1)
- PDF Reader (1)
- PECR (1)
- PIN number (1)
- Patching solutions (1)
- People Per Hour (1)
- Per-file Encryption (1)
- Pinterest (1)
- Planner (1)
- Power BI (1)
- Powershell (1)
- Privacy and Electronic Communications Regulations (1)
- Procuring (1)
- Proofpoint (1)
- Publisher (1)
- RAM (1)
- RDP (1)
- RDP attacks (1)
- RDP ports (1)
- RDP vulnerabilities (1)
- Red Snow Alert (1)
- Regulation of Investigatory Powers Act (1)
- Regulations (1)
- Remote Desktop Protocol (1)
- SBRC (1)
- SCVO (1)
- SIRIS (1)
- SMBs (1)
- SME predictions 2020 (1)
- SOP (1)
- SOPs (1)
- SSD (1)
- SSH encrypted (1)
- SSO (1)
- SUPEE-5344 (1)
- Safari (1)
- Sage (1)
- Sage Accounting 2015 (1)
- Salesforce (1)
- SamSa (1)
- Scotland (1)
- Scottish Business Resilience Centre (1)
- Scottish Council for Voluntary Organisations (1)
- Scottish Enterprise (1)
- Scottish Government (1)
- Security Solutions (1)
- Security and Information Governance (1)
- Security bug (1)
- Security threat (1)
- Server (1)
- Shadow IT (1)
- SharePoint Server (1)
- Six Secrets to Better IT guide (1)
- Skype for business (1)
- Slack (1)
- Snappa (1)
- Software Solutions (1)
- Software and IT Asset configuration management (1)
- Software as a Service (SaaS) (1)
- SolarWinds (1)
- Spectre (1)
- Staff News (1)
- Standard Operating Procedures (1)
- Storage Spaces Direct (1)
- Stress Survey (1)
- Symantec Cloud (1)
- TakeControl (1)
- Team Building (1)
- Technical Account Manager (1)
- Telecommunications Regulations (1)
- The Freak (1)
- Threat Track (1)
- ThreatTrack (1)
- ThreatTrack Security (1)
- TimeCamp (1)
- To-Do bar (1)
- Travelex (1)
- Travelex data breach (1)
- Trojan horses (1)
- UK (1)
- UK General Data Protection Regulation (1)
- UK citizens data (1)
- UK law (1)
- UK technology market (1)
- URL defense (1)
- USB Drives (1)
- Unison (1)
- Upwork (1)
- VIPRE Business (1)
- VM recovery (1)
- VR video (1)
- Virtual Memory (1)
- Volume (1)
- WEEE Directive (1)
- WUG (1)
- Watermark (1)
- Web Browsers (1)
- Web Protection (1)
- WebInsights (1)
- WhatsUpGold (1)
- White water rafting (1)
- Why IT cannot be a reactive activity (1)
- Wi-Fi (1)
- Wi-Fi security (1)
- Windows 10 upgrade (1)
- Windows 7 operating system (1)
- Windows 7 replacement (1)
- Windows Autopilot (1)
- Windows SBS 2011 (1)
- Windows SBS Server 2003 (1)
- Windows Server 2003 (1)
- Windows Server 2008 R2 (1)
- Windows Server 2016 (1)
- Windows XP (1)
- Xero (1)
- Yammer (1)
- Youtube (1)
- Zenefits (1)
- access (1)
- access rights management (1)
- accidental deletion (1)
- accidental threat (1)
- active directory (1)
- activities (1)
- address risks (1)
- advanced machine learning (1)
- advanced threat protection (1)
- advancing your IT strategy (1)
- advantages of BYOD (1)
- advice (1)
- agricultural drones (1)
- ambient environments (1)
- analytics (1)
- announcement (1)
- anti-malware (1)
- antivirus software (1)
- antivirus solution (1)
- app store (1)
- application audit (1)
- application recovery (1)
- application software (1)
- application sourcing (1)
- appraisal audit (1)
- archive (1)
- artificial intelligence (1)
- assess IT (1)
- assess risk (1)
- assess risks (1)
- asset and inventory tracking (1)
- asset register (1)
- attack surface (1)
- attacks (1)
- attracting talent (1)
- audit (1)
- auditing systems (1)
- audits (1)
- authentication (1)
- auto-fills (1)
- automate (1)
- automated monitoring (1)
- automatic updates (1)
- automation (1)
- autonomous vehicles (1)
- avoid phishing scams (1)
- back to school (1)
- back up solutions (1)
- back-up regime (1)
- backup for SMEs (1)
- backup process (1)
- backup services (1)
- backup system (1)
- backup testing (1)
- bad passwords (1)
- bandwidth (1)
- beginner's guide to encryption (1)
- best patching practice (1)
- best practices (1)
- better job (1)
- better the devil (1)
- better value IT (1)
- big organisation (1)
- biometrics (1)
- bitcoin (1)
- black friday (1)
- blockchain (1)
- blog post (1)
- boost performance (1)
- boost productivity (1)
- boost your IT performance (1)
- brand awareness (1)
- brand profile (1)
- brand reputation (1)
- breaches (1)
- brute force (1)
- business IT support (1)
- business challenges (1)
- business continuity plans (1)
- business continuity solutions (1)
- business improvements (1)
- business management (1)
- business mobile device (1)
- business operations (1)
- business plan (1)
- business process automation tools (1)
- business safety (1)
- business solutions (1)
- business to business marketing (1)
- business users (1)
- business vulnerabilities (1)
- businesses (1)
- cabling (1)
- calculator (1)
- campaign (1)
- can we live without passwords (1)
- centralised data (1)
- certification (1)
- certifying body (1)
- change (1)
- change IT provider (1)
- change layout (1)
- channel moderation (1)
- charts (1)
- chatbots (1)
- check backups (1)
- chips (1)
- chipsets (1)
- christmas shopping (1)
- client data (1)
- close outlook properly (1)
- cloud computing solutions (1)
- cloud data storage (1)
- cloud provider (1)
- cloud security (1)
- cloud service (1)
- cloud solutions (1)
- cloud technology (1)
- cloud-based collaboration tools (1)
- cloud-based server (1)
- cloud-based software (1)
- clutter (1)
- co-sourcing benefits (1)
- collaboration tool (1)
- collaboration tools & technologies (1)
- colour code (1)
- communications (1)
- company data (1)
- company devices (1)
- company mobile devices (1)
- company security (1)
- company systems (1)
- company values (1)
- competitive strategy (1)
- compromised password (1)
- computer hardware (1)
- computer protection (1)
- computer weekly (1)
- conference calling (1)
- confidential (1)
- confidential waste bins (1)
- consent for marketing (1)
- conserves space (1)
- consumer rights (1)
- content marketing (1)
- continuity (1)
- continuum (1)
- coronavirus phishing scam (1)
- coronavirus-related cybercrime (1)
- corporate data leakage (1)
- cost (1)
- cost management service levels (1)
- cost of data breach (1)
- cost saving (1)
- cracking (1)
- create 'Favourites (1)
- creating IT strategy (1)
- creating an Information Asset Register (1)
- criminal risk (1)
- critical data (1)
- crute force attack (1)
- customer experience (1)
- cyber attack risk (1)
- cyber attackers (1)
- cyber awareness (1)
- cyber defences (1)
- cyber insurance (1)
- cyber resilience (1)
- cyber security Edinburgh (1)
- cyber security breach (1)
- cyber security certificate (1)
- cyber security defences (1)
- cyber security education (1)
- cyber security experts (1)
- cyber security help (1)
- cyber security plan (1)
- cyber security practice (1)
- cyber security practices (1)
- cyber security risk (1)
- cyber security solutions (1)
- cyber security threat (1)
- cyber threat (1)
- cyber vulnerability (1)
- cyber-sercurity (1)
- cybersecurity awareness training (1)
- cybersecurity awareness training & testing for (1)
- cybersecurity training and testing (1)
- dark web risk (1)
- darknet (1)
- darkweb (1)
- data audit (1)
- data back up (1)
- data disaster (1)
- data governance (1)
- data leaks (1)
- data loss prevention software (1)
- data loss risk (1)
- data management policies (1)
- data privacy challenges (1)
- data privacy documentation (1)
- data privacy processes (1)
- data processes (1)
- data processing (1)
- data protection legislation (1)
- data protection policies (1)
- data residency (1)
- data retention policies (1)
- data security strategy (1)
- data sharing (1)
- data theft (1)
- data transfers (1)
- databases (1)
- datacentre (1)
- deep web (1)
- defence against hackers (1)
- delays (1)
- demands (1)
- design (1)
- desktop publishing (1)
- detox your digital (1)
- devices (1)
- difference between disaster recovery and business (1)
- digital alternatives (1)
- digital detox (1)
- digital document storage solution (1)
- digital processing (1)
- digital safety (1)
- digital security (1)
- digital skills (1)
- digital technology (1)
- digital transformation (1)
- direct marketing (1)
- disability campaign (1)
- disable add-ins (1)
- disaster (1)
- disaster recovery plans (1)
- disaster recovery process (1)
- disgruntled ex-employee (1)
- disruptive technologies (1)
- disruptive technology (1)
- document management (1)
- document storage (1)
- dotmailer (1)
- double up on your security (1)
- download IT strategy guide (1)
- downloads (1)
- downtime (1)
- driverless cars (1)
- drone technology (1)
- drones (1)
- eDiscovery (1)
- edinburgh IT support (1)
- edinburgh IT support company (1)
- educate employees (1)
- educate staff (1)
- educate users (1)
- education on cybersecurity (1)
- effective backup process (1)
- effective use (1)
- email compliance (1)
- email filtering service (1)
- email marketing (1)
- email phishing (1)
- email retention (1)
- email scanning tools (1)
- email search (1)
- email security solution (1)
- email security solutions (1)
- email threat (1)
- email viruses (1)
- embracing disruptive technology (1)
- employee development (1)
- employee devices (1)
- employee dismissal (1)
- employee leaving (1)
- employee support (1)
- employee termination (1)
- encrypt (1)
- encrypt data at rest (1)
- encrypt data in transit (1)
- encrypted login support (1)
- encrypting data (1)
- encryption policy (1)
- end of life support (1)
- end of summer (1)
- end of support (1)
- end of support for Windows 7 (1)
- end points (1)
- endpoint (1)
- environmental monitoring data (1)
- envy (1)
- erasure requests (1)
- eu referndum (1)
- experienced (1)
- experiences (1)
- explots (1)
- extended security updates (1)
- external IT (1)
- external IT support (1)
- external suppliers (1)
- false email addresses (1)
- festive season (1)
- festive spirit (1)
- festivities (1)
- file recovery (1)
- file transfer (1)
- filter web traffic (1)
- finance (1)
- fingerprints (1)
- first line of defence (1)
- five step guide (1)
- flexible working (1)
- flexible working practices (1)
- free event (1)
- free event Edinburgh (1)
- free upgrade (1)
- full disk encryption (1)
- functionalities (1)
- gaming computer (1)
- gartner (1)
- get the best from staff (1)
- gluttony (1)
- gmail (1)
- good passwords (1)
- grants for Cyber Essentials (1)
- graphics and video cards (1)
- greed (1)
- grow your business (1)
- guide to cloud security (1)
- hacked (1)
- halloween (1)
- handling confidential information (1)
- handling customer data (1)
- hardware asset list (1)
- hardware audit (1)
- hardware failure (1)
- hardware replacement (1)
- hardware updates (1)
- hashtags (1)
- health (1)
- help with remote working (1)
- helpdesk (1)
- high risk employees (1)
- hiring (1)
- holes (1)
- home network (1)
- home networks (1)
- home office (1)
- home users (1)
- home worker (1)
- home workers (1)
- homeworking (1)
- hotmail (1)
- how do I upgrade Windows 7 (1)
- how do you stop a phishing attack (1)
- how much does IT support cost (1)
- how to spot suspicious emails (1)
- how to stay safe when browsing online (1)
- humanity (1)
- hybrid backup solution (1)
- hybrid cloud (1)
- hyperconnected (1)
- iMac (1)
- iOS 8 (1)
- iOS devices (1)
- iPad Pro (1)
- iPhone (1)
- identify critical vulnerabilities and points of fa (1)
- identify weak spots (1)
- illnesses (1)
- images (1)
- implement new IT system (1)
- implementation testing (1)
- implementing (1)
- implementing change (1)
- importance of updates (1)
- improve efficiency (1)
- improve processes (1)
- improve productivity (1)
- improvement (1)
- improving office connectivity (1)
- in-house (1)
- in-house training (1)
- inbound marketing (1)
- increase efficiency (1)
- industry expert (1)
- information management practice (1)
- information management strategy (1)
- information security (1)
- infrastructure as a service (1)
- innovation (1)
- insecure data (1)
- insecure wireless networks (1)
- insider attacks (1)
- internal IT (1)
- internal IT advantages (1)
- internal and external IT work together (1)
- internet (1)
- internet explorer 10 upgrade (1)
- introduction to Cyber Essentials (1)
- invest in people (1)
- invest in training (1)
- junk email (1)
- key controls (1)
- key logging (1)
- knowledge (1)
- laptop breakdown (1)
- laptop hardware (1)
- large business (1)
- least privilege (1)
- legacy apps (1)
- legal risks (1)
- legislation (1)
- legitimate interest (1)
- letting an employee go (1)
- life without passwords (1)
- lifecycle of IT assets (1)
- limit user access (1)
- links (1)
- lockable document storage cabinets (1)
- long term technology challenges (1)
- lost mobile device (1)
- lost smartphone (1)
- lust (1)
- mail filtering (1)
- maintenance (1)
- maintenance procedure (1)
- malicious attack (1)
- malicious hackers (1)
- malicious threat (1)
- malware protection (1)
- malware security (1)
- managed archiving (1)
- managed threat prevention (1)
- managing critical business data (1)
- managing data (1)
- managing security (1)
- managing virtual work team (1)
- marketing calls (1)
- math (1)
- measures and controls (1)
- merry Christmas (1)
- merry Christmas from Grant McGregor (1)
- micro businesses (1)
- mobile device (1)
- mobile device security (1)
- mobile device security solution (1)
- mobile devises (1)
- mobile friendly (1)
- mobile malware (1)
- mobile responsive website (1)
- mobile search (1)
- mobile technologies (1)
- mobile workforce (1)
- mobilisation (1)
- mobility (1)
- modern working practices (1)
- monitoring rools (1)
- monitoring tools (1)
- move to Windows 10 (1)
- multi factor authentification (1)
- negligent threat (1)
- network equipment (1)
- network scanner (1)
- new IT provider (1)
- new Microsoft subscription model (1)
- new business continuity approach (1)
- new cyber security threat (1)
- new employee (1)
- new features (1)
- new normal (1)
- new rules for passwords (1)
- new season (1)
- new security threats (1)
- new solutions (1)
- new strategies (1)
- new technologies (1)
- new term (1)
- new version (1)
- new year (1)
- office connectivity (1)
- office wifi (1)
- on-device encryption (1)
- on-premise backup (1)
- on-premise server (1)
- one year since GDPR (1)
- online backup (1)
- online fraud (1)
- online scam (1)
- online security (1)
- online security threat (1)
- online share (1)
- online shopping (1)
- online tools (1)
- online training (1)
- operating procedures (1)
- operating systems (1)
- operational processes (1)
- optimise costs (1)
- organisation measures (1)
- organisational data (1)
- out-of-date hardware (1)
- outage (1)
- outsider attacks (1)
- outsource (1)
- outsource IT support (1)
- outsourced IT advantages (1)
- outsourced IT company (1)
- outsourced IT partner (1)
- overcharging (1)
- oversharing online (1)
- paperless (1)
- password blacklist (1)
- password generation tool (1)
- password manager (1)
- password policies (1)
- password practice (1)
- password spraying (1)
- password theft (1)
- password vault (1)
- patch vulnerabilities (1)
- permissions (1)
- personal attack (1)
- personal devices for work (1)
- phishers (1)
- phishing red flags (1)
- phishing scam (1)
- phishing simulator (1)
- phishing training (1)
- phone line (1)
- physical and network recovery (1)
- pitfalls of BYOD (1)
- plan (1)
- planning and processes (1)
- platform as a service (1)
- platforms (1)
- policies & procedures (1)
- policy (1)
- poor IT service (1)
- poor service (1)
- post-breach procedures (1)
- potential risk (1)
- practical measures (1)
- practical steps (1)
- predictions 2020 (1)
- prepare (1)
- prevent cyber attack (1)
- prevent cyber attacks (1)
- prevent insider attacks (1)
- prevent malicious sites (1)
- prevent ransomware attacks (1)
- price (1)
- price increase (1)
- pride (1)
- principle of least privilege (1)
- prioritise (1)
- prioritise IT spend (1)
- privacy (1)
- private cloud (1)
- procedure (1)
- procedures (1)
- process (1)
- processing data (1)
- processing personal data (1)
- processor modules (1)
- processor speed (1)
- productivity applications (1)
- productivity apps (1)
- productivity apps for small businesses (1)
- professional IT team (1)
- project team (1)
- proof of consent (1)
- pros and cons (1)
- protect against email attack (1)
- protect against phishing (1)
- protect data (1)
- protect devices (1)
- protect information assets (1)
- protect resources (1)
- protect your brand (1)
- protect your business (1)
- protect your business from cyber crime (1)
- protect your company (1)
- protect your device (1)
- protect your organisation (1)
- protection suite (1)
- protocols (1)
- public cloud (1)
- questions for IT providers (1)
- randomware (1)
- ransom fee (1)
- ransomware prevention (1)
- re-posting articles (1)
- rebrand (1)
- reciprocation (1)
- recover from cyber attack (1)
- recruitment tools (1)
- recrutiment (1)
- recycle IT equipment (1)
- red flags (1)
- reduce attack surface (1)
- reduce bandwidth (1)
- reduce costs (1)
- refresher training (1)
- registering for automatic upgrade (1)
- regulatory obligations (1)
- regulatory requirements (1)
- relevant IT (1)
- reliable (1)
- remote device location (1)
- remote team meetings (1)
- remote team members (1)
- remote wipe (1)
- remote wiping clause (1)
- remote working strategies (1)
- replace IT (1)
- replace your IT equipment (1)
- replacement equipment strategy (1)
- requirements (1)
- restoring (1)
- retention (1)
- review security policies (1)
- revoking systems access (1)
- right to be forgotten (1)
- right to erasure (1)
- rights and control (1)
- risk analysis (1)
- risks (1)
- safe online browsing (1)
- sales (1)
- save time (1)
- scalability (1)
- scam (1)
- scam email (1)
- scammers (1)
- secure (1)
- secure devices (1)
- secure file transfer (1)
- secure firewalls (1)
- secure login (1)
- secure mobile devices (1)
- secure mobiles (1)
- secure my business (1)
- secure remote access (1)
- secure remote access technology (1)
- security advice (1)
- security and compliance (1)
- security audit (1)
- security certification (1)
- security checklist (1)
- security compromise (1)
- security consultant (1)
- security consultants (1)
- security controls (1)
- security cordon (1)
- security essentials awareness (1)
- security practice (1)
- security procedure (1)
- security processes (1)
- security solution (1)
- security specialists (1)
- security standard process (1)
- security strategy (1)
- security threats (1)
- security threats 2020 (1)
- security tips (1)
- security tools (1)
- security training (1)
- security training cybersecurity training (1)
- sensitive data (1)
- shake up process (1)
- sharing personal data (1)
- shop safe online (1)
- short-term response plan (1)
- shredders (1)
- signals (1)
- six secrets guide (1)
- skills training (1)
- sloth (1)
- slow (1)
- small business (1)
- small organisation (1)
- smart cities (1)
- smart city (1)
- smart devices (1)
- social engineering risks (1)
- social media for SMEs (1)
- social media policy (1)
- social media presence (1)
- social media recruitment (1)
- social media security (1)
- social media security weak spot (1)
- social media targeting (1)
- social media tips (1)
- social media trends (1)
- social media vulnerabilities (1)
- social network (1)
- social phishing (1)
- social presence (1)
- social selling (1)
- software as a service (1)
- software asset list (1)
- software asset register (1)
- software upgrade (1)
- software vulnrabilities (1)
- spam filter (1)
- spoof attacks (1)
- spot a phishing attack (1)
- spot phishing attacks (1)
- spreadsheets (1)
- staff awareness (1)
- staff coaching (1)
- staff education (1)
- staff induction (1)
- staff skills training (1)
- standardise your procedures (1)
- staying safe online (1)
- stolen device (1)
- stolen mobile (1)
- stop phishing (1)
- stop ransomware (1)
- strategic training (1)
- strategies for surviving a cyber attack (1)
- strategy (1)
- strategy plan (1)
- subject matter experts (1)
- supply chain attacks (1)
- support (1)
- support calls (1)
- supporting work life balance through technology (1)
- suspect links (1)
- suspicious email (1)
- switch to Office 365 (1)
- switch your IT support provider (1)
- system restore (1)
- systems (1)
- systems audit (1)
- systems security (1)
- tackle employment barriers (1)
- targeted advertising (1)
- targeted phishing attack (1)
- technical measures (1)
- technical support (1)
- technology for homeworkers (1)
- technology issues (1)
- technology predictions (1)
- technology prices (1)
- technology review (1)
- technology roadmap (1)
- technology security policy (1)
- technology spring clean (1)
- technology strategy (1)
- technology trends 2019 (1)
- technology update (1)
- test BCDR plan (1)
- testers (1)
- the EU (1)
- the GDPR (1)
- the dangers of over-sharing online (1)
- the importance of online backup (1)
- the right to be forgotten (1)
- third parties (1)
- third party data (1)
- third party risk (1)
- third-party (1)
- top 10 technology trends (1)
- top 10 tips (1)
- top 250 (1)
- top 501 Managed Service Providers worldwide (1)
- top tips for IT (1)
- training session (1)
- training strategies (1)
- trending (1)
- trends (1)
- trick or treat (1)
- trojans (1)
- under skilled staff (1)
- unified approach (1)
- unlimited (1)
- unreliable (1)
- unsubscribe (1)
- up to date data and apps (1)
- update (1)
- update PC (1)
- update plans (1)
- updated software (1)
- updating (1)
- upgrade IT (1)
- upgrade PC (1)
- upgrade advice (1)
- upgrade browsers (1)
- upgrade hardware (1)
- upgrade software (1)
- upgrade technology (1)
- user issues (1)
- user-removable hardware (1)
- using technology for recruitment (1)
- value for money (1)
- verification (1)
- vetting (1)
- via websites (1)
- video calling (1)
- video conferencing (1)
- video marketing (1)
- videos (1)
- viral (1)
- virtual WAN (1)
- virtual assistants (1)
- virtual conferences (1)
- virtual meeting place (1)
- virtual office (1)
- virtual work team (1)
- virus scan (1)
- vishing (1)
- vital information (1)
- weak passwords (1)
- wearable devices (1)
- web filtering solutions (1)
- welikeit (1)
- whaling (1)
- what PC to buy (1)
- what computer hardware to buy (1)
- what data should I encrypt (1)
- what have we learnt since GDPR (1)
- what is RDP (1)
- what not to do when you lose your mobile device (1)
- what to do if you have lost your mobile phone (1)
- what to do when you lose your mobile device (1)
- where is my email (1)
- why SMEs should get expert help with cyber securit (1)
- why email filtering is more important than ever (1)
- why should I encrypt data (1)
- wifi connection (1)
- wifi encryption (1)
- windows 10 migration (1)
- windows server 2008 upgrade (1)
- winter (1)
- wired (1)
- withdrawal of support (1)
- work flexibility (1)
- work life balance (1)
- working remotely (1)
- wrath (1)
- zero day exploits (1)
- zero inbox (1)