Blog
With Windows 10’s Anniversary Update imminent, all the signs suggest security tools will be expanding. But what are some of the security features that are already proving to be popular? Sign-in options Windows 10 has enhanced passwords with PIN entry and a new ‘Picture’ password included. Alongside the traditional word-based & PIN options, ‘Picture’ passwords are a brand new feature. The ‘Picture’ password is akin to the ‘Pattern Lock’ on Android phones which asks users to swipe their finger to…
Read MoreA slow computer can be incredibly frustrating but before you fork out for an expensive new laptop or PC computer you should consider trying out a few of these tried and trusted techniques below. Often speeding up your computer can be easier and less costly than you might expect. 1 – Remove bloatware Bloatware might sound fancy or complicated but all it actually refers to is software which you don’t use and therefore takes up unnecessary space, ‘bloating’ your computer.…
Read MoreA recent report from the security firm Kaspersky Lab has claimed that so called ‘Ransomware’ is now the biggest and most persistent threat to internet security. Their report, which you can read here, acknowledges that there were as many as 2,900 incidents of Ransomware attacks during the first three months of 2016, a 14% increase on the previous quarter. Ransomware is a serious form of malware which locks away a victim’s files and then requests payment to unlock them, usually…
Read MoreAlong with the release of Google Chrome version 50 has come the news that support has ended for a number of older operating systems including Windows XP and Vista. Google has been promising since November that they would end support for older operating systems such as Windows XP, Windows Vista, OS X 10.6, OS X 10.7 and OS X 10.8 and this month they followed through with that promise. This means that users who access the Google Chrome browser on…
Read MoreResponding to the ever growing threat of cyber crime, Microsoft has ramped up their security efforts for their Office 365 platform. Users will now benefit from better visibility, control and security of data when using the cloud based services. In a blog posted on the Microsoft website, Bret Arsenault, Chief Information Security Officer for Microsoft, explained that their new approach “empowers customers to accelerate their adoption of a ‘protect, detect, respond’ security posture”. Office 365 is a cloud based service…
Read MoreOne of the most recent cyber security threats to come to our attention is the ‘whaling’ scam. This is a highly personalised form of phishing used to trick victims into giving away sensitive information and access to networks. What is it? Most phishing scams target a wide range of people and hackers will send their scam emails to a large number of recipients. However ‘whaling’ is different in that cyber criminals approach one ‘high value’ target with a highly personalised…
Read MoreRansomware is one of the most recent threats to your online security. We look at what it is, how it works and how you can protect your business effectively. What is it? Ransomware, as the name suggests, is a form of malware which locks away a victim’s files and then requests payment from them to have them returned. In 2013, Cryptolocker attacked around 250,000 computers worldwide stealing personal files and refusing to return them unless a ransom was paid immediately,…
Read MoreA recent investigation by the security firm Symnatec has uncovered that hackers are creating fake profiles on the social networking site LinkedIn in an effort to scam users. LinkedIn was established in 2003 and is a social networking site used by over 400 million professionals worldwide as an online form of business networking. As well as allowing businesses to connect with each other, it is also provides a reliable way for recruiters to headhunt potential employees by sending them ‘connection…
Read MoreComputer giant Dell has acknowledged a “profound security flaw” in computers sold to customers that could leave them open to attacks from hackers, allowing them to harvest important personal data such as bank details. Dell has released a statement which explains that a security certificate ‘eDellRoot’ pre-installed on some Dell laptops has “unintentionally introduced a security vulnerability”. The certificate, which was intended to allow Dell’s support teams to quickly identify a customer’s computer model and provide speedier solutions, could in…
Read MoreTalkTalk is the latest major company to fall victim to a significant cyber attack during which some of their customers banking details may have been accessed. While TalkTalk has gone on to say that the details accessed may have only been partly exposed, users are being warned that they could be targeted by opportunistic cyber criminals. It is relatively common that in the aftermath of a high profile attack hackers and other cyber criminals seize on the confusion and concern…
Read MoreIT Support
ECL recognises that every client is different, and every client has a different IT support requirement. Whatever the size of your business, we can offer a support scenario to suit your needs.
Cloud Services
Whether your business already uses Cloud services or you’re considering the Cloud as a possible way forward, talk to us first. We can provide anything from fully hosted IT infrastructures on our own ECL Private Cloud, to simple on-line backups. We can also give expert advice on Office 365 and other Cloud platforms.
Disaster Recovery
How would losing access to your IT systems and data for days, or even weeks, affect your business? For many if not most companies this would be a nightmare scenario, with potentially very serious consequences.
Office 365
Cloud services could potentially lower your overall costs and gives your employees all the tools they need alongside the correct layers of security and compliance.