Skip to the main content.

Our client portal provides all the tools you need to create, view or update your support requests. 


For urgent IT support during business hours, or if you suspect anything suspicious call  01314528444 for the fastest response.


If one of our team has asked you to start a remote control session on your computer, use the remote control menu option above.

cyber security.

robust and reliable advice and protection for small businesses

Cyber security image
Kevin Leighley (Technical Lead)

is cyber security still an issue?

Yes,  but it's a moving target. Your business is likely to be more secure than ever before, but new vulnerabilities are being targeted by criminals every day.

Historically,  security was physical with locks, and then alarms and cameras.  IT brought viruses, malware, spyware, phishing, and more, and our defences have improved each time.  

As artificial intelligence (AI) becomes mainstream it will be a force for both good and evil. For example, we'll see more advanced phishing attacks with really good grammar and spelling in the style of the person they are impersonating.  

My advice is don't be complacent about security, train your team well, instil best practice, deploy appropriate defences and have Insurance, just in case... 

Kevin Leightley (Technical Lead)

 

70
%

of medium businesses reported cyber security breaches or attacks

32
%

of UK charities reported cyber security breaches or attacks

£
17970

is the average cost of a data breach or cyber attack

69
%

have not done a cyber risk assessment

Official statistics for 2024 from the UK Government’s annual Cyber Security Survey 2024 (published 29th April 2024)

essential cyber security defences

(Included as standard with our all-in-one Managed IT Support services)

security training

security training

Your team are your most important asset.  But without the right training you can't expect them to perform.  It's the same for Cyber Awareness. Constant vigilance is critical.  Your team need to know the tricks the the bad guys use, how to recognise phishing emails and how to stay safe when on the road or working from home.

patching and updates

patching and updates

Your devices need to be kept up to date.  Manufacturers and software vendors are constantly releasing updates and patches to add functionality, improve performance and maintain security.  But be careful, older devices and software need to be replaced when support ends.  If you don't they become a risk and could invalidate your IT support or insurance.

password manager

password manager

Account and password policies that enforce good strong passwords are a given.  But, unless you have a password manager or an incredible memory, there is no way you and your teams are going to remember the many passwords that they use every day.  A business password manager keeps you in control of your organisation's passwords. 

endpoint protection

endpoint protection

Endpoint Detection and Response (EDR) is the minimum standard for protecting devices now.  Response is the critical component.  The faster you can block and remediate a threat the better.  Managed Detection and response takes this to the next level with experts in a 24/7 Security Operation Centre protecting your business.

essential cyber security configurations

(configured as standard with our all-in-one Managed IT Support services)

multi-factor authentication

multi-factor authentication

Multifactor (MFA) or two-factor (2FA) authentication is the current best practice recommendation for securing accounts in addition to strong unique passwords.  Turning it on should be a must for every system that you use.  In fact you shouldn't use any system that doesn't have it.

Microsoft 365 security

Microsoft 365 security

Have you heard of Microsoft Secure Score?  Do you know that Microsoft has a raft of policies that govern virtually all aspects of Microsoft 365.  If your IT service provider is doing its job properly you should score 80% or more, which means you have most of the recommended security settings in place.

least privilege access

least privilege access

Least privilege and its cousin 'zero trust' are in simple terms the practice of only allowing the people you want to access the things they need, where and when they need it.  It's actually relatively complex, but as a start, no person should have system admin rights on their day-to-day account, and instead should have a secondary admin only account for system configuration.

logging and alerting

logging and alerting

Do you know who accessed your systems, when they logged in, where from and what they did? Well you probably should.  Not because you want to spy on them, but you need to know if an account was accessed in Scotland at 9PM and from China only 5 minutes later.  That would be impossible unless you are Superman or Dr Who.  Enabling and reviewing logs is essential.

57% of businesses don't have cyber insurance!

If this is you fix it today (please).

cyber security recommendations

(in addition to our essential defences and configurations)

 

firewalls

All PC's, Mac's, Servers, etc. should have a firewall enabled and properly configured.  We also recommend a next generation firewall with comprehensive security features, such as intrusion detection, application filtering, web filtering and logging at the internet gateway too. We offer a managed firewall service with monitoring and central management.

 

vulnerability assessments

A regular vulnerability scan with remediation is recommended to identify hardware and software that needs reconfigured, updated, or patched in order to resolve known vulnerabilities. We offer one time security audits and also regular vulnerability assessments linked to Cyber Essentials.

 

pen testing

Penetration testing is often confused with vulnerability assessments.  The two are related and there is often crossover, but they are not the same.  Pen testing sets out to deliberately try to circumvent protections and to this extent will use known vulnerabilities and exploits to determine the the extent to which systems and data can be accessed as a result.

 

VPN & SASE

A VPN creates a secure encrypted tunnel between your device and a remote device (server/firewall) so that information can pass between the two securely.  Secure Access Service Edge is a variation on this using an internmediate cloud gateway to control access to your applications and and secure data in transit.

 

 

SIEM

SEIM stands for Security Information and Event Management. In simple terms is gathers data from all of you systems, logs it, and looks for potential security issues. Its impossible for a person to do this so it has to be automated.  There are two key benefits of SIEM.  1. Predictive alerts based established patterns. 2. Historical analysis and to determine the source of issues. If you dont already have SIEM then you should ask yourself why.

 

cyber essentials

Have you adopted a cyber security framework yet such as Cyber Essentials, ISO27001, NIST or CIS? If not we recommend starting with Cyber Essentials.  These 5 key tactics of the NIST framework are easy to understand and apply to your business: Identify risks, Protect, Defend, Respond, Recover. We offer UK Cyber Essentials Plus compliance as a managed service.

let us help keep your business safe