Is your Business Protecting its Users from Weaponised Emails?

Posted by Joytan Fernandes on 11-Sep-2019 10:24:02

Almost everyone is aware of email vulnerabilities, but do you act on it? According to FireEye Group, 91% of cyber-attacks started with an email. This is mostly because most people are under the assumption that they have proper up-to-date email security when they may not. Windows and Mac push monthly security updates which cover new advances in cyber-crime, but these updates are focused on making the system unbreachable but are not able to stop human errors via email which is why it is important to also invest in further proper email security.

Read More

Topics: Cloud Computing, Email Solutions, cyber attacks, Email Vulnerabilities, Cyber Security

How to Setup Face ID on your iPhone

Posted by Ben Spector on 17-Feb-2019 15:35:25

iphone-x-face-id-1

People hesitant about using Face ID might have skipped setting up this feature when they initially got their iPhones. If you were one of them and you have since changed your mind, here is how to setup Face ID in iPhone X, XS, XS Max, and XR.

Read More

Topics: iphone, mobile, face ID, Cyber Security

Just Because a Mobile VPN App Is Popular Doesn’t Mean It Is Protecting Your Privacy

Posted by Ben Spector on 27-Jan-2019 14:49:15

 shutterstock_1130046293

A study of the top free VPN apps available in Apple’s App Store and Google Play revealed that some of them might not be protecting your privacy as promised. Find out what the researchers discovered.

Read More

Topics: anti virus, apps, Communications, mobile, Cyber Security

Reputation Jacking: Another Trick Up Hackers’ Sleeves

Posted by Ben Spector on 13-Jan-2019 11:41:29

cybercrime-100534917-large

Reputation-jacking is on the rise. Discover what reputation-jacking is and why cyber criminals like to use it when attacking businesses.

Read More

Topics: Cloud Computing, Data Breach, Email Solutions, Business operations, helpdesk, IT Support, business, cyber attacks, cyber threats, data protection, business tips, Cyber Security

5 Noteworthy IT Trends That Will Affect SMBs in 2019 and Beyond

Posted by Ben Spector on 12-Jan-2019 15:09:26

IT trends

The IT industry is constantly changing. Because there are so many changes, it can be hard to discern which ones are most important. To help highlight the changes deserving attention, here are five IT trends that small and midsize businesses should know about.

Read More

Topics: solutions, helpdesk, IT Support, MSP, Office 365, Small Business, technology, Windows, Microsoft, Data Storage, IT strategy, data protection, outsourcing, business tips, desktop pc, budgets, Cyber Security

Are Your Employees a Security Liability or a Security Asset?

Posted by Ben Spector on 12-Jan-2019 14:03:05

shutterstock_515725240

While many companies realise they should provide IT security training, they often do not know where to begin. If your business is one of them, here are some suggestions to get you started.

Read More

Topics: training, data protection, Cyber Security

SMBs are Still Common Targets in Ransomware Attacks

Posted by Ben Spector on 17-Dec-2018 12:06:21

shutterstock_552746107

 

Read More

Topics: ransomware, Cyber Security

Adobe Suite Security Vulnerabilities

Posted by Ben Spector on 10-Aug-2018 14:46:00

Adobe Suite logos

Adobe Released a Mega Update That Patches More Than 100 Security Vulnerabilities

Five popular Adobe programs were found to be riddled with security holes. Learn about the programs that were affected, their vulnerabilities, and the update created to patch the holes.

Read More

Topics: adobe, patches, Cyber Security

Honeypots Reveal How Hackers Might Attack Your Business’s Cloud-Based Systems

Posted by Ben Spector on 09-Jul-2018 14:54:56

virtual-honey-pot-sized

Honeypots Reveal How Hackers Might Attack Your Business’s Cloud-Based Systems

To discover the security risks that businesses might face when they use public clouds, researchers conducted an experiment using honeypots. Here is what the researchers discovered.

Read More

Topics: Cloud Computing, business, Small Business, hacking, hackers, Cyber Security

The 5 Most Costly Types of IT-Related Cybercrimes

Posted by Ben Spector on 09-Jul-2018 14:08:22

shutterstock_680075008

Read More

Topics: Cloud Computing, Data Breach, firewall, servers, phishing, ransomware, theft, anti virus, business, computers, cyber, cyber threats, cyberattack, cybercrime, fraud, Passwords, protection, Small Business, hacking, scams, hackers, Cyber Security

Welcome to our Blog

We post new content every week!

Hopefully you will find it interesting and useful. We post on a variety of IT related topics including Best Practise advice, Top Tips and How To's.

At SpecTronics we've helped lots of small and medium sized businesses with their IT & Telecoms. Here's just some of the ways we could help you!

  • IT Support including Helpdesk and Onsite engineers
  • Cloud Telecoms/VoIP & Unified Comms solutions
  • A good cuppa and a chat if you just want some impartial IT advice!

So, if IT and all things tech leave you scratching your head, or you simply just don't have the time to manage it yourself Contact us and we can schedule in some time to plan a solution.

Subscribe Here!

Recent Posts

Posts by Tag

See all