HELPdesk LOGIN

Blog

COVID-19 – Keeping safe online in this difficult time.

COVID-19 – Keeping safe online in this difficult time.

Monday 23rd March 2020

Keeping safe online in this difficult time.... Read More...

A good time to update to Windows 10

A good time to update to Windows 10

Friday 25th October 2019

A good time to update to Windows 10, as extended support for Windows 7 draws to end in January 2020.... Read More...

Wi-Fi Worries?

Wi-Fi Worries?

Thursday 14th March 2019

Typical Wi-Fi networks rely on a single device for everything.... Read More...

What to do when your email password has been compromised

What to do when your email password has been compromised

Thursday 10th January 2019

If you find yourself a victim of email hacking there are a few very important steps you need to take. Although the key here is to act fast!!... Read More...

Why Two Factor Authentication matters.

Why Two Factor Authentication matters.

Tuesday 11th December 2018

With cyber-crime and internet fraud on the rise, it has become more important to safeguard your data. The most common types of breach are password related (81% of hacking-related breaches leveraged either stolen and/or weak passwords. — Verizon’s Data Breach Investigations Report 2017), normally gathered with phishing scams.
One way is to protect against password theft is with 2 Factor Authentication (2FA), which requires two steps in the verification process. This makes the act of stealing your information much more difficult. Most commonly 2FA introduces a second layer of identification to enable log in, this can be and authenticator app on your phone, a finger print scan, or the card reader the bank sends you for online banking. Having access to your password is no longer enough for a criminal to log into your account.

As with any change there are challenges that businesses might face when implementing 2FA. Traditionally this might have included providing users with a mobile phone, but today’s climate is such that most people have a mobile that they are willing to use for work even if it’s not provided by them. The most common issue, is getting the employees to understand why 2FA is important.
Many systems already use 2FA, so we are starting to find that users are becoming used to the extra steps, for example; an ATM requires a PIN and the card, and online banking requires a username and password and then sends a verification code via email or text.
An extra step of verification can take a few minutes, but this time drastically falls when users become accustomed to a practice. 2FA is now quick and easy to implement. Most systems take as little as two seconds to transfer a verification code.
The extra time taken makes it harder for identity theft (According to a study by cyber security firm Symantec, 80% of data breaches could be eliminated using 2FA) to happen to you, which in the long run seems worth the effort to us!
... Read More...

Wi-Fi 6 the next-generation wireless standard

Wi-Fi 6 the next-generation wireless standard

Wednesday 31st October 2018

More than just speed, it will provide better performance, from stadiums to your own home.... Read More...

What to expect in Windows 10 October 2018 Update.

What to expect in Windows 10 October 2018 Update.

Wednesday 12th September 2018

Windows 10 October 2018 Update, build version 1809, is coming soon. This major update includes Swiftkey, clipboard history that cloud syncs between your devices and a long-awaited dark theme for File Explorer.... Read More...

Setting up Windows System drive encryption without a TPM

Setting up Windows System drive encryption without a TPM

Tuesday 29th May 2018

You normally can’t encrypt your Windows operating system drive with BitLocker unless your device has a Trusted Platform Module (TPM) device. With Windows limitations there is often a work around. With a little change in some Group Policy settings (Windows Components: BitLocker Drive Encryption: Operating System Drives: Require additional authentication at start-up), you can configure Windows to prompt for a password in the pre-boot stage rather than relying on a TPM.... Read More...

GDPR

GDPR

Thursday 29th March 2018

General Data Protection Regulation (GDPR) - It has been well advertised that the existing Data Protection Act 1998, is due to be replaced in May 2018 with the General Data Protection Regulation. The aim is to introduce improved continuity of data protection throughout the EU. Businesses will be responsible for assessing their own data risks and their own data processes. The storage of data on mobile equipment such as laptops will require a greater level of protection. Will employees accessing data remotely from home present a data risk? All businesses will need to understand GDPR, devise a plan and timeline for compliance, train staff, audit current data processes and identify high risk areas. ... Read More...

BYOD Policy, the new black!

BYOD Policy, the new black!

Tuesday 1st March 2016

Following a recent Ofcom 2015 Communications Review, it’s not that astounding that one key finding that came from this report was the lack of separation between business and personal communications. Most employees now have smartphones along with many other devices that make it even easier for employees to make use of their own personal technology within the workplace.
... Read More...

Back to top