Tuesday 11th December 2018
With cyber-crime and internet fraud on the rise, it has become more important to safeguard your data. The most common types of breach are password related (81% of hacking-related breaches leveraged either stolen and/or weak passwords. — Verizon’s Data Breach Investigations Report 2017), normally gathered with phishing scams.
One way is to protect against password theft is with 2 Factor Authentication (2FA), which requires two steps in the verification process. This makes the act of stealing your information much more difficult. Most commonly 2FA introduces a second layer of identification to enable log in, this can be and authenticator app on your phone, a finger print scan, or the card reader the bank sends you for online banking. Having access to your password is no longer enough for a criminal to log into your account.
As with any change there are challenges that businesses might face when implementing 2FA. Traditionally this might have included providing users with a mobile phone, but today’s climate is such that most people have a mobile that they are willing to use for work even if it’s not provided by them. The most common issue, is getting the employees to understand why 2FA is important.
Many systems already use 2FA, so we are starting to find that users are becoming used to the extra steps, for example; an ATM requires a PIN and the card, and online banking requires a username and password and then sends a verification code via email or text.
An extra step of verification can take a few minutes, but this time drastically falls when users become accustomed to a practice. 2FA is now quick and easy to implement. Most systems take as little as two seconds to transfer a verification code.
The extra time taken makes it harder for identity theft (According to a study by cyber security firm Symantec, 80% of data breaches could be eliminated using 2FA) to happen to you, which in the long run seems worth the effort to us!
... Read More...
Wednesday 31st October 2018
More than just speed, it will provide better performance, from stadiums to your own home.... Read More...
Wednesday 12th September 2018
Windows 10 October 2018 Update, build version 1809, is coming soon. This major update includes Swiftkey, clipboard history that cloud syncs between your devices and a long-awaited dark theme for File Explorer.... Read More...
Tuesday 29th May 2018
You normally can’t encrypt your Windows operating system drive with BitLocker unless your device has a Trusted Platform Module (TPM) device. With Windows limitations there is often a work around. With a little change in some Group Policy settings (Windows Components: BitLocker Drive Encryption: Operating System Drives: Require additional authentication at start-up), you can configure Windows to prompt for a password in the pre-boot stage rather than relying on a TPM.... Read More...
Thursday 29th March 2018
General Data Protection Regulation (GDPR) - It has been well advertised that the existing Data Protection Act 1998, is due to be replaced in May 2018 with the General Data Protection Regulation. The aim is to introduce improved continuity of data protection throughout the EU. Businesses will be responsible for assessing their own data risks and their own data processes. The storage of data on mobile equipment such as laptops will require a greater level of protection. Will employees accessing data remotely from home present a data risk? All businesses will need to understand GDPR, devise a plan and timeline for compliance, train staff, audit current data processes and identify high risk areas. ... Read More...
Tuesday 1st March 2016
Following a recent Ofcom 2015 Communications Review, it’s not that astounding that one key finding that came from this report was the lack of separation between business and personal communications. Most employees now have smartphones along with many other devices that make it even easier for employees to make use of their own personal technology within the workplace.
... Read More...
Monday 21st December 2015
As the year draws to a close we would like to wish you all a Merry Christmas and a prosperous New Year from us here at NML.
We will be working up and until midday on the 24th December 2015 and thereafter a telephone support service will operate from the 29th December 2015 (8am - 6pm) through to the 31st December 2015.
Services will return to normal on the 4th January 2016. We look forward to providing you with full support in the new year.... Read More...
Tuesday 24th November 2015
NML became proud members of Sussex Chamber of Commerce this month and have already seen the benefits of the vast community that sits at the heart of BCC. The British Chambers of Commerce (BCC) has a powerful network of 52 Accredited Chambers of Commerce across the UK, representing thousands of businesses of all sizes and within all sectors.
The Sussex Chamber of Commerce is one of those 52 accredited Chambers that benefits from the support, services and insight of the BCC and who continue to have influence within our political system and government.
As newly appointed members, we look forward to many lively networking events, as well as being part of a highly respected organisation. ... Read More...
Wednesday 29th October 2014
The help desk solution is the core component to an IT support company and NML have run a tight ship with their in house solution called 'HERD 4.7'.
There are now plans to move towards a more unified remote monitoring management software solution (RMM) with a complete suite of managed security services including; asset and inventory management, smart business reports and online billing and time tracking.
This will be rolled out to all of our clients early 2015 to coincide with our CRM (Customer Relationship Management) solution.
... Read More...
Friday 29th August 2014
NML are proud to announce that we will be celebrating our 21st Birthday on the 25th September 2014.
... Read More...
Back to top