Latest from our business, security
and technology blog

Search the blog:

    2023-05-15 13:29:18

    Should your users be using Microsoft Edge Password Manager?

    In this blog, our team considers another of Microsoft’s technologies bundled with your Microsoft 365 subscription and asks: should your users be using Microsoft Edge Password Manager?

    2022-05-16 11:54:57

    The New Password Rules: 2022 Update

    It’s a while since the Grant McGregor team shared information about password best practice – and a lot has changed. Not least in terms of the new guidance in the UK Government’s Cyber Essentials scheme, but also in terms of the technology solutions now available to strengthen security. Earlier this...

    2022-03-08 11:05:21

    It’s time to check your business’s defences against the threat of Russian cyber attack

    While the cyber security of your business should always be a high priority, Russia’s invasion of Ukraine means that businesses may be at an increased risk of cyber-attack. Although there is no direct threat at present, the West is placing a range of sanctions on Russia. There could be retaliation,...

    2022-02-16 16:34:24

    Microsoft blocks 1,000 malicious emails a second

    Microsoft’s recently revealed that more than 35.7 billion malicious emails were sent to its customers last year. Fortunately for us, the tech giant blocked 1,000 of these malicious emails every second of 2021. That’s about 31.5 million seconds.

    2022-01-10 16:45:09

    Don’t worry about the potential downsides of a password manager. The upsides are far greater

    Last week there were stories that a password manager called LastPass had seen some of its customers’ master passwords compromised. The company denies that happened. And it’s possible that some of the people who reported being affected had old accounts with master passwords they’d used with other...

    2019-07-30 08:28:18

    The New Rules for Passwords in 2019

    Access control is fundamental to security – whether in your home, your office or your IT infrastructure. If passwords are the keys that open the doors to your IT estate for legitimate users, how do you stop them falling into the possession of malicious actors?

    1