0117 370 0777

Search

Security

  • How safe is your data

    How safe is your data?

    Electronic data is the lifeblood of most businesses in this connected age. Just think about how much you rely on your data for the smooth and effective running of your business. Your accounts are probably on a PC, server or in the cloud somewhere. Very few businesses get by with an old-fashioned cashbook these days and … Continued

    Read post >
  • meltdown and spectre

    Meltdown and Spectre

    What is the problem? It is essentially a hardware design mistake, and it affects a huge number of devices and systems, from all of the major manufacturers, in theory dating as far back as 1995. In the worst case it might allow stealing of passwords and security keys. Once a sufficiently important key has been stolen, … Continued

    Read post >
  • gdpr glossary

    GDPR glossary

    The General Data Protection Regulation shares many terms with the Data Protection Act. This is a layman’s guide to the most commonly used terms. We also have a general, very brief guide. Consent Permission to collect, store and use personal data. Data Controller The person who “owns” the data who determines the purposes for which, and the … Continued

    Read post >
  • website is insecure

    This website is insecure!

    With the expansion of online banking, home automation and much more, we need to pay ever more attention to online security. The last few years has seen a mammoth increase in cybercrime. Criminals are also becoming cleverer in the ways they attack us. Cybercrime isn’t victimless. Even if the bank reimburses stolen money (and spreads the loss … Continued

    Read post >
  • security certificates

    What are security certificates for?

    Digital certificates make secure transactions across the internet work. A certificate exists for every secure domain that you visit (banking, on-line shopping, etc.), and your web browser automatically collects and stores them for you. Certificates include two things: Proof of the site’s bona fides: The certificate describes the official ‘chain of trust’, from the site owner, right back … Continued

    Read post >
  • Don't be held to ransom

    Don’t be held to ransom

    In the past we’ve blogged on numerous occasions about the threats presented to businesses by email born viruses and ransomware (see our Phishing, spear phishing and whaling post) – which is where a piece of malicious software is unwittingly downloaded to a computer on your network and starts to encrypt everything it can find. This … Continued

    Read post >
  • phishing attack

    Phishing, spear phishing and whaling

    Urban myth: SMEs are not targets of cyber attacks You might think that your SME wouldn’t be a target for cyber criminals simply because larger companies offer greater opportunities, but you’d be very wrong. Such complacency could be very expensive. The total loss to SMEs from online fraud in 2015 was calculated at £9bn, whilst a 2016 … Continued

    Read post >

See what we can do for you today!

Contact us today if you'd like to find out more about Bristol IT Company