Blog

Explore the Easylife IT Blog for valuable insights and thought leadership on industry best practices in managed IT services and enterprise IT trends.

Should I be concerned about cyber security and where can I start?
Cyber security and resilience Expert Articles Learning Centre

Should I be concerned about cyber security and where can I start?

Should I be concerned about cyber security and where can I start?

The threat of cyber crime is a very real one. However, there is a big difference between being sufficiently concerned that you take action and being so terrified that you behave irrationally or do nothing at all.

The problem with fear is that it sometimes drives the wrong behaviour. Faced with a predator, our instinct can be flight rather than fight. Cyber crime is not a challenge from which to run away or bury our heads in the sand and hope the aggressor picks on someone else.

Cyber security and resilience Expert Articles Learning Centre

8 common cyber crimes that affect you!

We all know what bank robbers and burglars do.  Understanding their common tools and techniques helps us to design appropriate defence mechanisms.  Cyber crime is no different.  Recognising the different tricks of the trade empowers us to implement the cyber equivalent of locking the door or fitting an alarm.

How many of the following 8 common tactics employed by cyber criminals have you heard of?

Uncategorized

Security advisory: Google Chrome uses targeted by “Font wasnt found” scam

Please be aware that a new infection technique is doing the rounds; targeting Google Chrome users. The “font wasn&rsquo...

Uncategorized

Peterborough Gigabit network down for over 5 hours overnight

Our monitoring systems indicate the Peterborough Core fibre network was down from 19:30 until around 01:30 overnight. The (no...

EasylifeIT™ Blog

Centrally manage your team email signatures on Office 365

For those who are brand or legally conscious the appearance and content of your teams email signatures is of some importance. With so much communication these days via email from desktops, laptops and mobile devices, it is almost impossible to keep everyone’s presentation and standardised. Factor in a change of branding or a new promotion and it becomes a complete headache if you have any number of staff. If this is you; then you should perhaps consider CodeTwo’s excellent offering in this area.

What constitutes a good password and why it is important to have one?
Cyber security and resilience EasylifeIT TechTalks Learning Centre

What constitutes a good password and why it is important to have one?

What constitutes a good password and why it is important to have one?

Quite simply; your password is the key to your IT castle. The walls you carefully build around your business data are of little value if the front door lock is easily picked. The idea that passwords should be long and complex is one of IT industry’s sacred cows, and yet many users stubbornly stick to passwords such as 12345, Password1 or Jimmy1970; which often takes less time to crack than to type them. The question “So, what constitutes a good password?” is a common one.

Why are top managers often the targets of cyber criminals?
Cyber security and resilience EasylifeIT TechTalks Learning Centre

Why are top managers often the targets of cyber criminals?

Why are top managers often the targets of cyber criminals?

As top managers of SMEs, we expect and demand access to all data within our company. While we may consider restrictions upon our staff reasonable and sensible, these surely don’t apply to us? Of course, we need them; finance, operations, sales and marketing are the very pillars of our company, and we need access to every document and every record in every area.

Uncategorized

Cybersecurity tips for end users

Many tend to imagine that Cybersecurity is all about having an antivirus and a firewall. Whilst these are important...