Reputation Jacking: Another Trick Up Hackers’ Sleeves

Posted by Ben Spector on 13-Jan-2019 11:41:29

cybercrime-100534917-large

Reputation-jacking is on the rise. Discover what reputation-jacking is and why cyber criminals like to use it when attacking businesses.

Read More

Topics: cloud computing, cybersecurity, data breach, Email Solutions, Business operations, helpdesk, IT Support, business, cyber attacks, cyber threats, security, data protection, business tips

Honeypots Reveal How Hackers Might Attack Your Business’s Cloud-Based Systems

Posted by Chris Selby-Rickards on 09-Jul-2018 14:54:56

virtual-honey-pot-sized

Honeypots Reveal How Hackers Might Attack Your Business’s Cloud-Based Systems

To discover the security risks that businesses might face when they use public clouds, researchers conducted an experiment using honeypots. Here is what the researchers discovered.

Read More

Topics: cloud computing, cybersecurity, business, cloud, small business, hacking, hackers

Faceless Cybercriminals Aren’t the Only People Who Might Steal Your Business Data

Posted by Chris Selby-Rickards on 09-Jul-2018 14:39:33

shutterstock_189358703

Faceless Cybercriminals Aren’t the Only People Who Might Steal Your Business Data

Although most companies take measures to defend against external cyberattacks, threats from within are often overlooked. Find out how to defend your business against insider threats.

Read More

Topics: data breach, Disaster Recovery, firewall, breach, breaches, Data, IT Support, Backup, business, computers, protection

The 5 Most Costly Types of IT-Related Cybercrimes

Posted by Chris Selby-Rickards on 09-Jul-2018 14:08:22

shutterstock_680075008

Read More

Topics: cybersecurity, data breach, firewall, servers, breaches, phishing, ransomware, theft, anti virus, business, cloud, computers, cyber, cyber threats, cyberattack, cybercrime, fraud, passwords, protection, security, small business, hacking, scams, hackers, computer security

Business Email Scammers Put Behind Bars

Posted by Chris Selby-Rickards on 09-Jul-2018 12:21:36

shutterstock_583338262

Read More

Topics: cybersecurity, Disaster Recovery, Business operations, cyber crime, IT Support, phishing, ransomware, anti virus, business, computers, cyber, cyber attacks, cyberattack, cybercrime, email, fraud, london, office 365, security, small business

GSuite for Business - 4 Gmail Enhancements That Can Help Your Business

Posted by Chris Selby-Rickards on 28-Jun-2018 01:38:26

shutterstock_695926525

4 Gmail Enhancements That Can Help Your Business

Google is totally revamping Gmail. Here are four enhancements that can help you and your employees be more secure and work more productively when using Gmail.

Read More

Topics: cloud computing, Business operations, business, cloud, email, small business, gsuite, gmail

How do i use One Drive?

Posted by Chris Selby-Rickards on 02-May-2018 13:45:12

How do i use One Drive? How to Share Files and Folders in OneDrive

Many businesses use Microsoft’s free OneDrive accounts to store their data, but businesses can also use those accounts for file sharing. Learn about the two ways to share files and folders, including when to use each method.

Read More

Topics: cloud computing, Collaboration, Data, business, cloud, email, microsoft, onedrive, data storage, files, file sharing

GDPR Deadline Is Looming

Posted by Chris Selby-Rickards on 19-Apr-2018 22:18:14

The date on which companies need to be in compliance with the General Data Protection Regulation (GDPR) is approaching fast. Find out when this deadline is and what it means for businesses worldwide.

Read More

Topics: data breach, solutions, Data, data backup, IT, IT Support, business, gdpr, IT Services, london, small business

PDF Files: Handy for Businesses — and Hackers

Posted by Chris Selby-Rickards on 19-Apr-2018 22:14:57

PDF files are the No. 1 type of file used in cyberattacks. Find out why hackers like to use them and how to protect your business.

Read More

Topics: cybersecurity, data breach, helpdesk, IT, ransomware, anti virus, Backup, business, cyber, cyberattack, cybercrime, fraud, security, hacking, hackers, pdf

SamSam Is on the Loose and Headed for a Server Near You

Posted by Chris Selby-Rickards on 19-Apr-2018 14:32:52

In March 2018, the SamSam ransomware ravaged Atlanta’s computer systems, bringing many city services to a halt. This wasn’t the first time hackers used this ransomware to wreak havoc and it won’t be the last. Learn how SamSam differs from most other ransomware.

Read More

Topics: cybersecurity, Disaster Recovery, firewall, breach, data backup, helpdesk, IT, IT Support, phishing, ransomware, anti virus, business, cloud, cyber, cyber threats, cyberattack, cybercrime, IT Services, passwords, security, Server, small business, hacking, software, samsam

Welcome to our Blog

We post new content every week!

Hopefully you will find it interesting and useful. We post on a variety of IT related topics including Best Practise advice, Top Tips and How To's.

At SpecTronics we've helped lots of small and medium sized businesses with their IT & Telecoms. Here's just some of the ways we could help you!

  • IT Support including Helpdesk and Onsite engineers
  • Cloud Telecoms/VoIP & Unified Comms solutions
  • A good cuppa and a chat if you just want some impartial IT advice!

So, if IT and all things tech leave you scratching your head, or you simply just don't have the time to manage it yourself Contact us and we can schedule in some time to plan a solution.

Subscribe Here!

Recent Posts

Posts by Tag

See all