EasylifeIT TechTalks

How secure is my office Wi-Fi?
Cyber security and resilience EasylifeIT TechTalks Learning Centre

How Secure is My Office Wi-Fi?

How secure is my office Wi-Fi?

A vulnerable route straight into the system.

Earlier this year I sat in a restaurant (remember doing that?) awaiting the arrival of a customer, ready to discuss the final details of a project. Habitually, I was very early; having allowed for traffic, natural disasters, et al, none of which occurred and I, therefore, had plenty of time to catch up on emails. I asked the restaurant manager if Wi-Fi was available and without hesitation, and a proud little flourish, I was presented a code on the back of a card designed just for the purpose. All very efficient and organised I thought.
How can I educate my team on cyber security?
Cyber security and resilience EasylifeIT TechTalks Learning Centre

How can I educate my team on cyber security?

How can I educate my team on cyber security?

“Why did I get infected? I have an antivirus” is quite a common question and a good one. Whoever named the most common method of infection “Trojan Horse” certainly knew their history; and for the few who haven’t heard the story or watched the movie; a seemingly impregnable and well defended city was broken by exploiting the trust, ignorance and superstition of otherwise sophisticated people.

What constitutes a good password and why it is important to have one?
Cyber security and resilience EasylifeIT TechTalks Learning Centre

What constitutes a good password and why it is important to have one?

What constitutes a good password and why it is important to have one?

Quite simply; your password is the key to your IT castle. The walls you carefully build around your business data are of little value if the front door lock is easily picked. The idea that passwords should be long and complex is one of IT industry’s sacred cows, and yet many users stubbornly stick to passwords such as 12345, Password1 or Jimmy1970; which often takes less time to crack than to type them. The question “So, what constitutes a good password?” is a common one.

Why are top managers often the targets of cyber criminals?
Cyber security and resilience EasylifeIT TechTalks Learning Centre

Why are top managers often the targets of cyber criminals?

Why are top managers often the targets of cyber criminals?

As top managers of SMEs, we expect and demand access to all data within our company. While we may consider restrictions upon our staff reasonable and sensible, these surely don’t apply to us? Of course, we need them; finance, operations, sales and marketing are the very pillars of our company, and we need access to every document and every record in every area.

EasylifeIT TechTalks

Vivacious EasylifeIT™ TechTalk at Peterborough Museum

What did the Romans do for us?; a thought provoking backdrop for the latest EasylifeIT™ TechTalk. Peterborough Museum w...

EasylifeIT TechTalks

EasylifeIT™ TechTalks Print and Protect-IT

We have seen a significant uplift in virus and malware incidents these past few weeks; the vast majority circumventing antivi...

EasylifeIT TechTalks

Coming up! EasylifeIT™ Tech Talk in April 2015

The next of our successful EasylifeIT™ TechTalks is on the 16th April 2015 and hosted by Peterborough Museum in Priestg...