Is your Business Protecting its Users from Weaponised Emails?

Posted by Joytan Fernandes on 11-Sep-2019 10:24:02

Almost everyone is aware of email vulnerabilities, but do you act on it? According to FireEye Group, 91% of cyber-attacks started with an email. This is mostly because most people are under the assumption that they have proper up-to-date email security when they may not. Windows and Mac push monthly security updates which cover new advances in cyber-crime, but these updates are focused on making the system unbreachable but are not able to stop human errors via email which is why it is important to also invest in further proper email security.

Read More

Topics: cybersecurity, Email Solutions, cloud, cyber attacks, Email Vulnerabilities, Weaponised Email Vulnerabilities

Just Because a Mobile VPN App Is Popular Doesn’t Mean It Is Protecting Your Privacy

Posted by Ben Spector on 27-Jan-2019 14:49:15

 shutterstock_1130046293

A study of the top free VPN apps available in Apple’s App Store and Google Play revealed that some of them might not be protecting your privacy as promised. Find out what the researchers discovered.

Read More

Topics: cybersecurity, anti virus, apps, Communications, mobile

Reputation Jacking: Another Trick Up Hackers’ Sleeves

Posted by Ben Spector on 13-Jan-2019 11:41:29

cybercrime-100534917-large

Reputation-jacking is on the rise. Discover what reputation-jacking is and why cyber criminals like to use it when attacking businesses.

Read More

Topics: cloud computing, cybersecurity, data breach, Email Solutions, Business operations, helpdesk, IT Support, business, cyber attacks, cyber threats, security, data protection, business tips

SMBs are Still Common Targets in Ransomware Attacks

Posted by Ben Spector on 17-Dec-2018 12:06:21

shutterstock_552746107

 

Read More

Topics: cybersecurity, ransomware, security, computer security

Honeypots Reveal How Hackers Might Attack Your Business’s Cloud-Based Systems

Posted by Ben Spector on 09-Jul-2018 14:54:56

virtual-honey-pot-sized

Honeypots Reveal How Hackers Might Attack Your Business’s Cloud-Based Systems

To discover the security risks that businesses might face when they use public clouds, researchers conducted an experiment using honeypots. Here is what the researchers discovered.

Read More

Topics: cloud computing, cybersecurity, business, cloud, small business, hacking, hackers

The 5 Most Costly Types of IT-Related Cybercrimes

Posted by Ben Spector on 09-Jul-2018 14:08:22

shutterstock_680075008

Read More

Topics: cybersecurity, data breach, firewall, servers, breaches, phishing, ransomware, theft, anti virus, business, cloud, computers, cyber, cyber threats, cyberattack, cybercrime, fraud, passwords, protection, security, small business, hacking, scams, hackers, computer security

Business Email Scammers Put Behind Bars

Posted by Ben Spector on 09-Jul-2018 12:21:36

shutterstock_583338262

Read More

Topics: cybersecurity, Disaster Recovery, Business operations, cyber crime, IT Support, phishing, ransomware, anti virus, business, computers, cyber, cyber attacks, cyberattack, cybercrime, email, fraud, london, office 365, security, small business

What is Phishing?

Posted by Ben Spector on 20-Jun-2018 15:22:48

3 Ways Small Businesses Can Take Advantage of Artificial Intelligence

What is Phishing and How to Keep Your Company Safe From Phishing Attacks

Phishing is a type of cyberattack in which criminals essentially trick users into disclosing their personal information such as passwords, credit card numbers and so on. This is becoming an increasingly popular attack vector, with more than 3 in 4 (76 percent) organizations in the UK saying they experienced a phishing attack in 2017, according to figures collated by Wombat Security.

Read More

Topics: cybersecurity, phishing, cyber attacks, cybercrime, email, security, computer security

Cybercrime in Business

Posted by Ben Spector on 01-Jun-2018 13:13:38

The Devastating Effects of Cyberattacks on Small Businesses

Cybercrime in Business.

The 5 Most Costly Types of IT-Related Cybercrimes

A report issued by the Internet Crime Complaint Centre shows that cybercrime victims lost more than £1 billion in 2017. Here are the top five IT-related cybercrimes that cost businesses and individuals the most amount of money.

Read More

Topics: cybersecurity, cyber crime, cyber attacks, cybercrime, security

What is Cloud Computing used for?

Posted by Ben Spector on 02-May-2018 13:55:41

cloud data backup

What is Cloud Computing used for?

The Top 5 Benefits of Hybrid Cloud Backup

 

Have you switched your company’s backup solution to hybrid cloud backup yet? Find out 5 reasons why you should consider jumping onto the hybrid cloud backup bandwagon.

Read More

Topics: cloud computing, Collaboration, cybersecurity, Business operations, Data, data backup, Backup, chrome, cloud, computers, google, security, small business, software, folders, file share, microsoft, onedrive, data storage, office, 365, files, computer security, filing system, file sharing

Welcome to our Blog

We post new content every week!

Hopefully you will find it interesting and useful. We post on a variety of IT related topics including Best Practise advice, Top Tips and How To's.

At SpecTronics we've helped lots of small and medium sized businesses with their IT & Telecoms. Here's just some of the ways we could help you!

  • IT Support including Helpdesk and Onsite engineers
  • Cloud Telecoms/VoIP & Unified Comms solutions
  • A good cuppa and a chat if you just want some impartial IT advice!

So, if IT and all things tech leave you scratching your head, or you simply just don't have the time to manage it yourself Contact us and we can schedule in some time to plan a solution.

Subscribe Here!

Recent Posts

Posts by Tag

See all