separate admin account

Why it is important to have a separate admin account

With top level access, the administrator holds the keys to the business; change settings, update passwords, lock accounts, create accounts, grant/remove privileges and more for all areas of business. Naturally, these privileges are most sought after by hackers because they too will have these high-level abilities, causing havoc across the whole organisation.

Disaster Recovery Plan

How to write a Disaster Recovery Plan

All organisations experience disruptions, whether that’s from a cyber attack, IT failure, weather event or something else, and they need to be prepared. The longer it takes to address an issue, the more the costs will spiral and the harder it will be to recover.

Hackers

Hackers?...Stopped! Understanding the Criminal’s Secrets

Your cyber security is only as strong as the weakest link in your defence. Unfortunately for organisations such as EasyJet, Facebook and Marriott Hotels, gaps in their security have resulted in major cyber breaches,

The Internet of Things

The Internet of Things (IOT)

Smart devices have revolutionised the way we live our lives, at home and at work. Many smart devices designed for the home allow you to control them remotely.

Restrict user privileges

Restrict user privileges to reduce the insider threat

Of the many cyber threats facing organisations, the one that should not be overlooked is the “insider threat”.