So you’ve tapped a bad link on your phone

So you’ve tapped a bad link on your phone

We’ve all done it: clicked on a link, realised it wasn’t what we expected, and then worried about the potential damage to our phone.

First and foremost, do not be alarmed.

Then, and only then, take action. There are two things you should know right now. And you can find out what they are in our new video.

Watch this new video now 


The biggest security threat to your business is on your payroll

The biggest security threat to your business is on your payroll

Revealed : The true cost of insider assaults — and how to avoid them

An insider attack has a significant probability of compromising your company’s data.

The majority of insider attacks are unintentional. By accident, a well-intentioned employee clicks on a malicious link.

However, some attacks are carried out by malicious attackers who are out to do harm or profit.

Both of these types of attacks can be avoided or reduced by concentrating on five critical areas of your IT strategy.

Now is the time to read our new guide to see how prepared your company is.

Protect your business from scams with FREE cyber security features

Could your business afford to lose £100,000? We don’t know of many SMEs who easily could, especially in the current climate, where the global pandemic has created extra expenses and minimised income streams in plenty of cases. By layering a few simple, inexpensive, or even free security measures, you can slam the door firmly in the faces of cyber criminals looking to take advantage.

First of all, let’s take a look at a real scenario from the experience of a local business who were scammed out of £100,000, which all started with a spearfishing attack.


What is a spearphishing attack?

 A spearfishing attack, is when login credentials are gathered by means of a fake login page. In our example, the victim found himself on a login page which looked legitimate, mirroring the real login page he would usually use, but in actuality it was being used to send his username and password straight to the scammers.

The criminals then didn’t do anything straight away. They monitored the victims’ inbox for six months in order to determine if his was the right inbox to use to carry out their plan, and it turned out that he was. In that time, they analysed the language, the nicknames he used for people, and they learnt who authorised what within the company. Only when they were confident that they had all the information they needed did they make their move.

 They found an email relating to a financial transaction, doctored it with their own financial details, let it loose, and £100,000 was paid into the wrong account.


How to prevent being scammed with cheap or even free cyber security features.


How to prevent being spearphished

First of all, we’ve written about security before and the importance of layering security measures to give your business the best chance of protection. And this example is great for showing what that might look like.

 First of all, we want to do everything we can to prevent the spearphishing.

 For Office 365 users, there is something called Advanced Threat Protection which you can add to your mailboxes. This checks links for threats in real time, which means if you visit a website one day and it’s fine, but they get hacked overnight, if you go to click on the same link the next day you will receive a warning. Advanced Threat Protection won’t remove the risk of threat completely, but it’s the first line of defence. In our example, this could have alerted the victim that the website he was about to visit wasn’t legitimate.

 The second line of defence here, is DNS filtering. This compares links with a catalogue of known phishing attempts which is kept up-to-date. That combined with the Advanced Threat Protection, provides a good amount of security.


But what if someone still managed to slip through the net?

 Office 365 saves the day again with multi factor authentication (MFA). And the really wild thing about this is that it’s completely free. That’s right, if you already have Office 365 – which most businesses do – you can enable MFA at no extra cost.

 MFA means that when you login, as well as your username and password, you also need to enter a code which is usually sent to, or generated by an app on a mobile device. So even if someone elsewhere had your username and password, they wouldn’t be able to login without that extra code as well. This would have stopped our scam example in its tracks.

 So there we have it. Three simple things which are either free, or pretty inexpensive, could stop your business from losing £100,000. It really is a no brainer!


If you’d like us to take a look at your data security setup as it is at the moment, and recommend any changes to stop something similar from happening to you, give us a call on  01732 617788 or drop us an email to [email protected]. We can chat about what you need, and how you might get the best out of it for your business. Got a jam-packed schedule? Book an appointment with Jon Cross here. We don’t want anyone to lose their money to scammers, when the fix can be so simple.

How to solve the problem of voicemail

We’ve all experienced that situation phoning a company as a customer and either being put on hold, or reaching voicemail. It’s a frustration for customers, and a very real concern for businesses – particularly those who are currently in a stage of growth without quite enough resource to answer all of the calls they’re receiving.

The frustration for your customers can be lessened if you think about their experience when they call you.

Reduce the number of missed calls in the first place

With a VoIP phone system, you can easily have it set up so that multiple phones ring at the same time. That way if the main person answering the phones is busy, someone else can pick it up if they need to. Even if they’re taking a name and number for the relevant person to give them a call back, it does a lot for keeping customers happy.

Sometimes voicemail is inevitable

With all the best will in the world, sometimes people will still need to leave you messages. With a VoIP phone system, you can set up voicemail to email. This means that when someone leaves a voicemail, you instantly get a notification to your email, as well as a recording of the message. This makes it much easier to go through your voicemails and deal with their contents methodically, making sure nothing gets missed.

If you’ve been thinking about updating your phone system to help reduce the number of missed calls and reduce customer frustrations, give us a call on  01732 617788 or drop us an email to [email protected]. We can chat about what you need, and how you might get the best out of it for your business. Got a jam-packed schedule? Book an appointment to chat with Jon Cross here. We’re all about excellent communication!

OneDrive saves the day as your portable scanner

OneDrive saves the day as your portable scanner

You’re working from home and getting things done when you realise you need to print, sign, and scan a document.

You have a printer, so that’s fine. However, there is no scanner. That’s vexing. How are you going to get this done today?

Microsoft 365 is here to help! A scanner is built into an app that you may already be using. Everything you need to know is right here.

Watch this new video now 


These are the threats to worry about

These are the threats to worry about

An easy-to-read guide to the nine most dreadful types of malware.

All businesses are constantly targeted by malware. And it’s estimated that there are now one billion pieces of it floating around.

What exactly is malware? It is malicious software designed to cause harm to your IT systems or steal your data.

Most IT professionals are terrified of malware. It should frighten you as well.

We’ve created a brand new guide to educate you on the nine most common types of malware. It has been written in such a way that anyone can understand it.