Blog
One of the most recent cyber security threats to come to our attention is the ‘whaling’ scam. This is a highly personalised form of phishing used to trick victims into giving away sensitive information and access to networks. What is it? Most phishing scams target a wide range of people and hackers will send their scam emails to a large number of recipients. However ‘whaling’ is different in that cyber criminals approach one ‘high value’ target with a highly personalised…
Read MoreRansomware is one of the most recent threats to your online security. We look at what it is, how it works and how you can protect your business effectively. What is it? Ransomware, as the name suggests, is a form of malware which locks away a victim’s files and then requests payment from them to have them returned. In 2013, Cryptolocker attacked around 250,000 computers worldwide stealing personal files and refusing to return them unless a ransom was paid immediately,…
Read MoreA recent investigation by the security firm Symnatec has uncovered that hackers are creating fake profiles on the social networking site LinkedIn in an effort to scam users. LinkedIn was established in 2003 and is a social networking site used by over 400 million professionals worldwide as an online form of business networking. As well as allowing businesses to connect with each other, it is also provides a reliable way for recruiters to headhunt potential employees by sending them ‘connection…
Read MoreComputer giant Dell has acknowledged a “profound security flaw” in computers sold to customers that could leave them open to attacks from hackers, allowing them to harvest important personal data such as bank details. Dell has released a statement which explains that a security certificate ‘eDellRoot’ pre-installed on some Dell laptops has “unintentionally introduced a security vulnerability”. The certificate, which was intended to allow Dell’s support teams to quickly identify a customer’s computer model and provide speedier solutions, could in…
Read MoreTalkTalk is the latest major company to fall victim to a significant cyber attack during which some of their customers banking details may have been accessed. While TalkTalk has gone on to say that the details accessed may have only been partly exposed, users are being warned that they could be targeted by opportunistic cyber criminals. It is relatively common that in the aftermath of a high profile attack hackers and other cyber criminals seize on the confusion and concern…
Read MoreFacebook users are being targeted by scammers’ just weeks after Facebook announced they are close to developing a long awaited ‘dislike’ button. On the 15th September, Mark Zuckerberg, CEO of Facebook, announced that the social networking giant was “very close” to developing a ‘dislike’ button which will allow users to show empathy toward fellow users at times when a ‘like’ would not be suitable, such as when a loved one passes away. However, scammers have quickly started to manipulate the…
Read MoreBack in 2012, Microsoft launched its first attempt at an operating system that coped with the inevitable collision of tablets and desktops. Regarded by most users as a flop, Windows 8 was typified as an awkward mismatch between touch friendly technology and more traditional desktop operating systems; in short, it didn’t work for either desktop or tablets users. Whilst the Windows 8.1 update helped, its lifespan was still most notably marked by headlines such as ‘’Windows 8, it really is…
Read MoreCloud computing sounds complicated, but it simply means storing and accessing data and programs on the internet instead of on your computer’s hard drive. Whereas in the past people were limited only to the data and programs present on their local hard drives, cloud computing has now opened up new and exciting opportunities for individuals to access endless streams of data through internet connectivity. For those of you with smartphones and laptops there is a good chance that you will…
Read MoreIs your business utilising all the benefits that mobile and remote working technology has to offer? By the end of this year, nearly half of the global population will be using the internet. It is predicted that by 2016, 32% of the global workforce will be working outside the office as a result of mobile technology, with two thirds of these owning a smart phone. But despite advances in technology and changes in attitudes, fewer than half of all companies…
Read MoreIt has been announced in the last few days that a new computer virus has been discovered which has been named Rombertik. The malware is designed to capture any plain text entered into a browser. Nicknamed by Cisco Systems, Rombertik’s primary purpose is a big worry but this new type of malware has an additional destructive threat. Once setup on a Windows computer, Rombertik will check to see if it has been detected. The malware performs several regular internal checks…
Read MoreIT Support
ECL recognises that every client is different, and every client has a different IT support requirement. Whatever the size of your business, we can offer a support scenario to suit your needs.
Cloud Services
Whether your business already uses Cloud services or you’re considering the Cloud as a possible way forward, talk to us first. We can provide anything from fully hosted IT infrastructures on our own ECL Private Cloud, to simple on-line backups. We can also give expert advice on Office 365 and other Cloud platforms.
Disaster Recovery
How would losing access to your IT systems and data for days, or even weeks, affect your business? For many if not most companies this would be a nightmare scenario, with potentially very serious consequences.
Office 365
Cloud services could potentially lower your overall costs and gives your employees all the tools they need alongside the correct layers of security and compliance.