IGC Fighting Crime
Every now and then something happens that proves all of the warnings IT suppliers make about back-ups and data protection are not just overblown efforts to sell their IT support services. A burglary last week proved to be one of them.
This week we take a look at some recommendations received from two trusted sources to see how they are helping with the fight against Cyber Crime.
Don’t know your
As Cyber Security continues to be at the forefront of the news we thought we would recap the history of the internet’s most negative users.
With the latest in a long stream of high profile attacks on business computer systems hitting the headlines this week, we have put together some guidelines into actions we recommend you take if your computer systems are hacked (or if you think they might have been).
Many IT teams overlook the need for security when it comes to their organisation’s printers. Despite the fact that these are part of the network and often linked to an external company whose security you have no control over.
The term “Shadow IT” is used to describe IT systems and solutions that are implemented within an organisation but don’t have official planning and approval behind them.
Microsoft recently produced
With the proliferation of cloud based products available direct to SMEs across the UK, we are often asked what benefits there are to using a specialist IT company when the customer could go direct to the software supplier.