Blog
A disturbing flaw in Wi-Fi networks has allowed for hackers to eavesdrop on data being passed through most modern Wi-Fi networks. This means that any device, from laptops and mobile phones to games consoles and tablets, could all be vulnerable to hacking with credit card numbers, passwords, chat messages and emails all potentially under threat. Known as a key reinstallation attack or KRACK for short, this newly discovered flaw was unearthed by Marty Vanhoef, a Belgian researcher. What’s more, the…
Read MoreYou might not realise it, but your computer could be infected with a form of malware which collects everything you type into your keyboard. Throughout the day it could harvest passwords for your banking, social media accounts and other personal information –which could lead to identity fraud, blackmail and more. What is a key logger? The programme in question is called a keystroke logger – or a key logger for short. While these programmes can sometimes be used for honest…
Read MoreThe ability of a business to recover quickly from an IT disaster cannot be underestimated. Getting back on your feet in a speedy manner can help avert financial loss, harm to reputation and other negative impacts. While we all hope that our own businesses will never be affected by disruptive incidents like cyber attacks, theft, fire or flooding, they can happen and failing to prepare is preparing to fail! A good place to start when considering how prepared you are…
Read MoreBusinesses are being warned to protect themselves after tech giant Google released research claiming that cyber thieves have extorted a total of £19m from ransomware since 2015. At a talk at the Black Hat security conference in Las Vegas, Elie Bursztein from Google revealed the results of research conducted with Chainalysis, the University of California and New York University which looked at bitcoin transactions over the period. It concluded that ransomware has become a “very profitable market and is here…
Read MoreControlled Folder Access – that’s the name of a new feature coming to Windows which could add extra protection against dangerous Ransomware like WannaCry and Petya. News coming from technology website The Verge says that Microsoft will include a special tool in their next major update expected in September. The ‘Controlled Folder Access’ option which will be found in the Windows Defender Security Centre will offer users an option to ‘protect their files and folders from unauthorized changes by unfriendly…
Read MoreHave you noticed that your Wi-Fi connection at work is slow and lagging? Are you struggling to upload documents and download files? It could be that someone is piggybacking off your Wi-Fi to surf the internet, reducing the amount of service available to you and your colleagues. While you want your broadband signal to be strong and wide reaching so that everyone working in your offices can get adequate internet access, it’s important to have limitations in place. If you…
Read MoreLaunched in 2012, Google’s trio of services – Google Drive, Google Docs & Google Sheets – are a popular way for businesses to carry out their work online. Google Drive acts a cloud storage service, Google Docs as an alternative to Microsoft Word and Google Sheets as an alternative to Microsoft Excel. Among the perks of these services is the ability for multiple users to edit their work in real time. This means that from a business perspective you can…
Read MoreMicrosoft has released its biggest patch update ever including 18 patches, with 9 classed as ‘critical’ and a further 9 classed as ‘important’. Microsoft’s latest bumper package of patches comes after a quiet start to the year in terms of updates, with no patches released in February at all. However, this latest update includes fixes for a reported 135 different vulnerabilities across Windows operating systems from Vista to Windows 10. Patch updates are incredibly important in protecting your business. Hackers…
Read MoreIn terms of defending your business online, your password is one of your first lines of defence. Whether it’s for encrypted files on your computer, access to your company’s social media networks or for your online banking credentials, it’s incredibly important that you make your passwords as difficult and off-putting to hackers as possible. #1 – You’re password is too easy to guess This is the first and most common mistake that people tend to make with their passwords. While…
Read MoreRansomware attacks were a huge talking point in 2016 with many businesses and individuals forced to pay up after hackers compromised their data and locked them out of their computers with a digital ransom note. The advice from the majority of IT professionals encourages victims of Ransomware attacks to never pay up to hackers in the event of an attack. But it can be a very difficult decision to make to refuse payment when your entire business is on the…
Read MoreIT Support
ECL recognises that every client is different, and every client has a different IT support requirement. Whatever the size of your business, we can offer a support scenario to suit your needs.
Cloud Services
Whether your business already uses Cloud services or you’re considering the Cloud as a possible way forward, talk to us first. We can provide anything from fully hosted IT infrastructures on our own ECL Private Cloud, to simple on-line backups. We can also give expert advice on Office 365 and other Cloud platforms.
Disaster Recovery
How would losing access to your IT systems and data for days, or even weeks, affect your business? For many if not most companies this would be a nightmare scenario, with potentially very serious consequences.
Office 365
Cloud services could potentially lower your overall costs and gives your employees all the tools they need alongside the correct layers of security and compliance.