EasylifeIT TechTalks

mfa
EasylifeIT Blog EasylifeIT TechTalks EasylifeIT™ Blog

Fortifying SME Security: A Deep Dive into Multi-Factor Authentication (MFA)

Small and Medium Enterprises (SMEs) face an escalating threat from cybercriminals targeting their valuable data. With limited...

Sharepoiint tips
EasylifeIT TechTalks EasylifeIT™ Blog IT Products for Business

Maximising Business Efficiency: Essential SharePoint Tips for Technical Success

SharePoint, Microsoft’s powerful collaboration and document management platform, is a cornerstone for many businesses s...

How secure is my office Wi-Fi?
Cyber security and resilience EasylifeIT TechTalks Learning Centre

How Secure is My Office Wi-Fi?

A vulnerable route straight into the system. Earlier this year I sat in a restaurant (remember doing that?) awaiting the arr...

How can I educate my team on cyber security?
Cyber security and resilience EasylifeIT TechTalks Learning Centre

How can I educate my team on cyber security?

How can I educate my team on cyber security?

“Why did I get infected? I have an antivirus” is quite a common question and a good one. Whoever named the most common method of infection “Trojan Horse” certainly knew their history; and for the few who haven’t heard the story or watched the movie; a seemingly impregnable and well defended city was broken by exploiting the trust, ignorance and superstition of otherwise sophisticated people.

What constitutes a good password and why it is important to have one?
Cyber security and resilience EasylifeIT TechTalks Learning Centre

What constitutes a good password and why it is important to have one?

What constitutes a good password and why it is important to have one?

Quite simply; your password is the key to your IT castle. The walls you carefully build around your business data are of little value if the front door lock is easily picked. The idea that passwords should be long and complex is one of IT industry’s sacred cows, and yet many users stubbornly stick to passwords such as 12345, Password1 or Jimmy1970; which often takes less time to crack than to type them. The question “So, what constitutes a good password?” is a common one.

Why are top managers often the targets of cyber criminals?
Cyber security and resilience EasylifeIT TechTalks Learning Centre

Why are top managers often the targets of cyber criminals?

Why are top managers often the targets of cyber criminals?

As top managers of SMEs, we expect and demand access to all data within our company. While we may consider restrictions upon our staff reasonable and sensible, these surely don’t apply to us? Of course, we need them; finance, operations, sales and marketing are the very pillars of our company, and we need access to every document and every record in every area.