Cyber security and resilience

What constitutes a good password and why it is important to have one?
Cyber security and resilience EasylifeIT TechTalks Learning Centre

What constitutes a good password and why it is important to have one?

What constitutes a good password and why it is important to have one?

Quite simply; your password is the key to your IT castle. The walls you carefully build around your business data are of little value if the front door lock is easily picked. The idea that passwords should be long and complex is one of IT industry’s sacred cows, and yet many users stubbornly stick to passwords such as 12345, Password1 or Jimmy1970; which often takes less time to crack than to type them. The question “So, what constitutes a good password?” is a common one.

Why are top managers often the targets of cyber criminals?
Cyber security and resilience EasylifeIT TechTalks Learning Centre

Why are top managers often the targets of cyber criminals?

Why are top managers often the targets of cyber criminals?

As top managers of SMEs, we expect and demand access to all data within our company. While we may consider restrictions upon our staff reasonable and sensible, these surely don’t apply to us? Of course, we need them; finance, operations, sales and marketing are the very pillars of our company, and we need access to every document and every record in every area.

Cyber security and resilience

Security Advisory: Telephone Voicemail Hacking Leading to Enormous Bills

We have all heard of voicemail hacking, but it appears it isn’t just the red top gossip rags after your secrets, but also criminal gangs targeting your company telephone system … and bills.

While outside our IT support remit, this morning we assisted a customer whose telephone system had been hacked over the weekend, and as a consequence have run up a bill of several thousand pounds in international phone call charges. Not knowing where to start, the customer called us and what we discovered was quite shocking as to just how easily this was effected by hacking of the voicemail system. So much so that I thought a security advisory was wise; suggesting that you raise this matter with your telephone supplier as a preventative measure.