How to avoid an Office 365 security breach
A data breach is when protected information is taken without consent. It’s that simple. A breach is an opening that is not supposed to be there, it’s like having a hole…
Read PostA data breach is when protected information is taken without consent. It’s that simple. A breach is an opening that is not supposed to be there, it’s like having a hole…
Read PostTuesday 24th July 2018 is a big day, it’s “HTTPS” day – the day when the latest version of Google’s Chrome web browser (Chrome 68) starts to flag websites that…
Read PostMay 25th came and went and, despite all the portents of doom, the planet did not wobble out of orbit and head into the sun. What was May 25th? GDPR…
Read PostWhy would your website be targeted? Contrary to popular belief, it’s not the larger websites that are the prime targets of hackers. Websites belonging to SMEs are frequently seen as…
Read PostSoon you must be something else! Brexit was always going to have unexpected or unintended consequences, but a particularly nasty one for business was reported just before Easter: The EU is suggesting it will…
Read PostGDPR, Double Opt ins and Re-Subscription As things stood at the end of 2017, email marketers were required to ask the contacts on their marketing lists to re-subscribe to enable…
Read PostWhat is the General Data Protection Regulation? The General Data Protection Regulation (GDPR) adds much more stringency to the legal duties of protecting, and correctly using, data that organisations hold…
Read PostHow do you ensure the best ROI? Americans call it Line-of-Business (LoB) software. It’s the special stuff that’s specific to your profession or market, or even more specific to your…
Read PostMany of us at Bristol IT Company are parents (even grandparents!), and we all recognise the risks and threats that the internet and social media pose to our children. Which is why…
Read PostWhen “M” has finished spymastering for the day, or pops out for a cheeky Nando’s, we always see her locking the “Top Secret” files away in the office safe. Of course,…
Read PostElectronic data is the lifeblood of most businesses in this connected age. Just think about how much you rely on your data for the smooth and effective running of your business.…
Read PostWhat is the problem? It is essentially a hardware design mistake, and it affects a huge number of devices and systems, from all of the major manufacturers, in theory dating…
Read Post