Itâs when youâre logging into something, and you generate a code on a separate device. So proving itâs really you.
Which makes it really, really hard for someone to log in to your systems â even if theyâve somehow got hold of your password.
So far as I can see, youâre not already using multi-factor authentication across all apps. And I highly recommend that you implement it now.
Itâs really simple for us to set up for you. And can be 99% effective at blocking criminals from logging in to things they really shouldnât be logging into.
Purely from a business perspective, weâve seen more changes in 8 months than most of us have in 5 to 10 years.
Fortunately, not all of the changes have been negative. The pandemic has allowed us to be more open minded with the way that we do business, and to allow a lot more flexibility for our people.
So itâs no surprise that these changes have meant that more office moves are now on the horizon for next year.
Whether itâs downsizing due to more people working remotely
Or moving to a larger space because the changes have allowed growth
Or even abandoning the office altogetherâŠ
Changing office space is a lot of work. And if not done properly, can mean a lot of downtime and frustration for your team.
Even if youâre not planning a move or change for many months, can you keep us in the loop please.
Because any kind of move is a great time to look at the technology that underpins the way you work every day.
The more we can understand what could happen within your business over the next 3 to 5 years. The better we can help you plan for maximum flexibility.
From hackers armed with ransomware, I mean. Hopefully you can answer ânoâ to that question.
But do you really know youâre not under attack at this moment? Or are you guessing, because you havenât seen any obvious signs of ransomware? Obvious enough to tell us about them.
(note â ransomware is the computer attack where a hacker locks you out of your systems and data. And you must pay a ransom, typically in Bitcoin, to get access again)
Well hereâs a frightening fact: Hackers can spend weeks or even months in your network, preparing and waiting for the right time to launch their attack on your business.
Some of the security monitoring we do for you can spot an attack. But there are extra security tools weâd prefer you used â plus we need your team to keep an eye out too.
Because if you know some of the tell-tale signs, you can spot an attack is possible. And tell us, so we can take action to try to prevent it.
Thatâs why weâve written a new guide for you. Itâs called â4 signs youâre under attack from ransomwareâ. And it details the main things you need to look out for, to keep your network intruder-free.
OK, itâs slightly more technical than the guides we normally write. But itâs still perfectly understandable by anyone.
As a business owner, you get this from your team now and again. Sometimes itâs expected; sometimes itâs out of the blue. Frankly, itâs annoying.
One of the things you must consider when anyone leaves, is how to make sure your businessâs data is fully protected.
Of course, you should take this case by case. But there will usually be some instances where you wouldnât trust someone not to try and take some company data when they leave.
For this reason, itâs vital to have a plan of action which includes:
Removing their access to email
Disabling access to all their apps and software
Taking a backup of all data and archiving it
Only giving your people access to the files they need to use in the first place
Removing access to cloud-based apps on their personal devices
Disabling any company owned devices
Weâre always here to help and give advice. Would you like us to review the plan for when someone leaves your business?
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are as essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Recent Comments