Entries by John Murray

Mastering Outlook in Microsoft 365

Are you using Outlook in Microsoft 365 to its full potential? With so many powerful features, it’s easy to overlook tools that can make a big difference. This guide highlights Outlook’s key features that can boost your efficiency and keep your inbox organized. Classic Outlook vs. new Outlook Microsoft offers two versions of Outlook: classic […]

How Much Cybersecurity Is Enough?

Cybersecurity investments can be infinite: Here’s how to find your floor. You can make unlimited investments in cybersecurity and still never achieve that nirvana of being “totally secure.” At the same time, service interruptions or losing customer data are so detrimental to your company’s reputational trust and financial bottom line that security is paramount. So, […]

Exploring the risks and benefits of password managers

In recent years, password managers have become an indispensable asset for individuals and organisations, fortifying their IT infrastructure. However, while they deliver unparalleled convenience by securely storing and auto-populating login details and generating robust, unique passwords, they’re not without vulnerabilities. For example, a Google advisory published this year highlighted a concerning flaw where several password managers could be […]

,

5 ways to improve email security

With email being the biggest business productivity tool out there, it’s no surprise that it’s also the main vehicle for cybercrime. Email phishing is the most common type of online exploitation, which grew by 173% in Q3 of 2023 compared to the previous quarter of the same year! Google blocks about 100 million phishing emails every single […]

Cybersecurity awareness month: the 4 biggest security mistakes to avoid

Cybersecurity Awareness Month has been celebrated in October since 2002. It’s a time for everyone, from everyday internet dwellers to private companies, to come together and work to raise awareness about the importance of cybersecurity in the world we live in. Today I’ll take a look at the four biggest security mistakes that, even now, people […]

Why MFA isn’t foolproof: How to strengthen your security

Multifactor authentication (MFA) significantly enhances your business’s security, but it’s not invincible. Cybercriminals have found ways to exploit MFA’s weaknesses, and understanding these is essential for safeguarding your business. This article will guide you through common MFA hacks and provide preventive strategies. How cybercriminals bypass MFA Cybercriminals use a variety of techniques to compromise MFA […]

,

3 Security advantages of the Cloud

Small and medium-sized businesses (SMBs) no longer need to view cybersecurity as an insurmountable challenge. Cloud technology has transformed the security landscape, providing SMBs with access to enterprise-level solutions without having to maintain extensive in-house IT infrastructure or staff. Here are three security advantages the cloud offers over traditional IT setups Access to specialized expertise […]

,

Essential cybersecurity tips for small businesses

Cyberattacks target businesses of all sizes. While large corporations often grab headlines, small businesses are increasingly becoming prime targets due to their often weaker security defenses. Fortunately, by following the tips in this article, you can enhance your business’s cybersecurity posture. Secure your cloud storage Cloud storage provides a convenient and cost-effective solution for storing […]

Picking the MSP for you: The basics and what to consider

Small and medium-sized businesses often stretch themselves thin, with IT management becoming a significant burden. Seeking external IT support through a managed IT services provider (MSP) is a common solution. However, understanding the role of an MSP and choosing the ideal partner can be confusing without a little help. Fortunately, we’ve provided this guide, listing […]