Grant McGregor Blog
Posts about

Cyber Security

What is Typosquatting? And What Can You Do to Protect Your Organisation from It?

What is Typosquatting? And What Can You Do to Protect Your Organisation from It?

A phishing method which relies on “typosquatting” is on the rise. But what is typosquatting? And how can you protect your organisation from it? Typosquatting is nothing new – ever since the early days of the Internet, people have been cashing in on domain names that sound or look like the official...

Read More

Working From Home: are your systems still secure?

Working From Home: are your systems still secure?

Even before the lockdown was announced in March 2020, businesses across the UK were doing what they could to ready their business for the effects of the pandemic. But now that we're in 2021 and a 3rd lockdown for some, have you done enough to make your systems more secure? 

Read More

12 Security & Compliance Reasons for Switching to Microsoft Teams and Why You Should Do It Now – PART 2

12 Security & Compliance Reasons for Switching to Microsoft Teams and Why You Should Do It Now – PART 2

Last week we shared part one of our blog ‘12 Security & Compliance Reasons for Switching to Microsoft Teams and Why You Should Do It Now’ including the first 6 of 12 reasons and today’s blog looks at the next 6.

Read More

12 Security & Compliance Reasons for Switching to Microsoft Teams and Why You Should Do It Now – PART 1

12 Security & Compliance Reasons for Switching to Microsoft Teams and Why You Should Do It Now – PART 1

There may be more than 12 days until Christmas, but the end of the year is fast approaching so Grant McGregor is bringing you 12 Security & Compliance Reasons for Switching to Microsoft Teams and Why You Should Do it Now. Well actually, this week we bring you the first 6 reasons, but you can read...

Read More

Why the Technology You Choose Can Make the Difference between a Good Day and a Bad Day

Why the Technology You Choose Can Make the Difference between a Good Day and a Bad Day

The Grant McGregor team considers why the moment is ripe for a technology review. The technology we use on a daily basis can make the difference between a good day and a bad day.

Read More

What is the principle of “least privilege”? And should you be following it?

What is the principle of “least privilege”? And should you be following it?

You might have heard or read about the principle of least privilege in the context of cyber security – especially if you have looked into the Cyber Essentials scheme. This blog looks at why it’s important and how it can be implemented successfully.

Read More

The forgotten risk of our new WFH reality

The forgotten risk of our new WFH reality

Even before the lockdown was announced in March this year, businesses across the UK were doing what they could to ready their business for the effects of the pandemic. While their efforts have been herculean, it is now time to check that all new systems are secure.  

Read More

Why the IT Support Partner You Choose to Work With Could Be Your Biggest Security Risk

Why the IT Support Partner You Choose to Work With Could Be Your Biggest Security Risk

Cyber Security - let’s call it what it really means – protecting yourself against Criminals. Modern cyber crime might be one of the biggest risks your business faces. It could cause you massive disruption, reputational damage or even ultimately to close shop. But how do you know your business is...

Read More

Grant McGregor Publishes New Cyber Essentials Guide to Recent Changes

Grant McGregor Publishes New Cyber Essentials Guide to Recent Changes

The way the Cyber Essentials scheme is run has changed significantly during 2020. Grant McGregor Ltd has now published a short guide to explain the changes and how they might affect you.

Read More

How to ensure web applications used in your business are secure

How to ensure web applications used in your business are secure

What are you doing to secure your business website and other web applications used in your business? If you run local browser (web) applications, they are probably secured with a variety of techniques, including firewalls, regular patching and network monitoring. But what happens when you are...

Read More

    Categories

    see all