Friday, 21 September 2018

BYOD is here (to stay)

BYOD is here (to stay) but the security pitfalls are too…

By: Samantha Geary, Marketing Executive

Bringing devices into the workplace is becoming a growing trend.

In the last decade, mobile devices such as smartphones have gone from being used in the workplace by a few, to being in almost everyone’s pockets. The growing trend toward the BYOD culture will continue to become increasingly more popular.

They offer a range of functionality for both personal and business use, so represent a powerful tool for your business.

Are mobile devices right for your business?

How can mobile devices benefit your business?

It’s more common now for work to be done on the move. This is partly because of the demands of various industries, but also because it’s quite frankly a lot easier. Gone are the days of chunky laptops, you can now have all the computing power you need in either a smartphone or tablet. So, mobile devices can really help improve the efficiency within your business.

Mobile devices can help you branch out. If your clients are situated in different locations, then it’s far more efficient for your employees to be able to write up their reports or send an email whilst they’re out on site rather than having to wait to return to the office.

It’s clear that mobile devices offer your business two main things: increased efficiency and scalability but it’s important to ask yourself the question…

Does your industry involve your employees having to be out of the office for a long period of time?

Do they visit clients often?

Do they work from home a lot?

If the answer is yes, then mobile devices can benefit your business and your productivity.

Access Anywhere!

Another thing to consider is whether your business could be improved by having quicker response times to emails and similar forms of communication. Again, if the answer is yes, then mobile devices can really help to improve your business’s efficiency.

In the 21st century there are very few businesses which wouldn’t benefit from the BYOD culture. Being able to answer emails on the go and write reports whilst travelling can help with your company’s productivity and revolutionise the way your business operates.

What type of mobile devices are out there?

Broadly speaking, there are three types of mobile devices:

– Smart phones

– Tablets

– Laptops

The boundaries between these three categories can be blurred, with some smartphones being so large that they could also be categorised as tablets, and some tablets having the same functionality as laptops.

Most businesses use smartphones to increase their efficiency and productivity. Tablets are also very common. Many tablets now come with accessories, such as external keyboards, meaning they essentially have the same functionality as laptops. Laptops are becoming less popular as tablets catch up with them in terms of portability and ease-of-use. However, laptops will still provide the benefit of extra processing power and in some cases – extra functionality.

 

Risks of BYOD: Security Pitfalls

Security and privacy are the main risks of bringing your own device into the workplace. What happens if your device is stolen or gets lost? As an absolute minimum you should ensure you have strong passwords to all storage devices and encrypt the data to provide another layer of security if the password is unfortunately cracked.

Devices bought into the workplace often vary in age and specification so there is always the risk that they are not secure enough. Because these devices are often used for both work and personal use the applications and websites visited could leave security vulnerabilities on devices. These devices call for rigorous antivirus and firewalls should be updated regularly.

What happens to the information on a device when an employee leaves the company? If the device contains confidential customer data, your business could be liable for a breach of data. 

This blog only touches on the security risks of bringing your own device to work, there are so many more risks out there and being more aware will help you and your team members.

If you want some more information on BYOD or you’d like to find out what products and services we can over to help with portable devices security get in touch today!

Meet The Author

Name: Sam Geary
Employment Start Date: August 2017
Job Title: Marketing Executive
Years in Marketing: 3

Check out Sam on Social Media:

Registered in England No. 3082062

2-4 Northfield Point
Cunliffe Drive
Kettering
Northamptonshie
NN16 9QJ

08452 41 41 55

PCS logo

The post BYOD is here (to stay) appeared first on PCS.



source https://www.pcs-systems.com/byod/

Thursday, 6 September 2018

10 Reasons Why You Need an IT Service Provider

10 Reasons Why You Need An IT Service Provider

By: Samantha Geary, Marketing Executive

Businesses can choose whether to have an
in house IT department or outsource their support to a managed service provider…
Stuck on your decision?
Here are 10 reasons why outsourcing could be the best option for you…

This article gives you ten reasons why you need external IT support. We look at the benefits and the facts around outsourcing so you are left fully informed when it comes to making the business changing decision.

 

  1. Focus on Your Business

Outsourcing your IT support leaves you with more time and resources to focus on other core business activity. You’re safe in the knowledge that your IT systems are protected by professionals and you won’t be required to deal with infrastructure issues or the day-to-day maintenance of your IT systems. IT can be seen as a complex science (which it isn’t) and when you experience downtime, the side effects can often consume a lot of your valuable time. Outsourcing means you don’t need to worry about planning a big system upgrade. It’s down to your IT support provider to ensure your infrastructure is up-to-date and running to your standards.

  1. Risk Reduction

Having an external IT team means you can (if you choose to) have support available 24/7. The support will be handled by experts with years of experience in the field. This means that, if there is an issue, you can be assured that it’ll be fixed as soon as possible. This will result in reduced downtime for your business and a better process for if things do unfortunately go wrong.

  1. Specialised Knowledge

As mentioned before, using an IT service provider means tapping into years of experience and a vast knowledge-base. To put simply – if your current IT department (if you have one) consists of a small team of three people, outsourcing your IT to a specialist company means opening your doors up to a larger team of people. This means you can get advice from your service provider if you’re looking to expand your business or if you want to upgrade your IT systems.

  1. Keeping Up-To-Date

Similar to specialist knowledge, IT service providers will be up-to-date with the latest in tech. This means your business will have access to the latest IT solutions. This has a whole host of benefits including increased resilience for your network and increased efficiency.

  1. A Predictable Monthly Budget

With an IT service provider, you negotiate a monthly fee for support. Any additional costs are discussed prior to the implementation of any new IT infrastructure. This means you have a far better idea of your monthly outgoings.

  1. Detailed Documentation of Your IT Infrastructure

IT service providers will keep an inventory of your IT infrastructure, so you have a detailed map of what makes up your network. This is integral if you want to keep up-to-date. It’ll give you an idea of how old various parts of your network are and what might need upgrading. Keeping your network up-to-date is important if you want to maintain optimum efficiency, but it is also necessary if you want to reduce your vulnerability to cyber-attacks.

7. Damage Recovery

  1. Online attacks are so common, so if you find that your business is the victim of a cyber-attack or a server crash, a managed service provider means that your systems will be back up and running as soon as possible, but also that your data will be safe. Backing up sensitive information will all be handled by your IT service provider, giving your business that bit more protection and peace of mind.
    1. Highly Customisable

    Using an IT service provider means giving your business access to a whole range of services to meet your needs, but it also provides a flexible solution if you want to expand or diversify. Not only can an IT service provider ensure that your network keeps up with your goals, it can also help you achieve those goals by recommending new IT solutions.

  1. Cost Savings

With an IT service provider, you won’t have to worry about having an in-house IT department. This means you don’t have to pay wages or training. IT is a fast-moving industry, and this can mean a lot of training, so using an IT service provider removes this cost entirely. Happy days!

  1. Cloud Solutions

Finally, using an IT service provider can help facilitate further outsourcing. Rather than having all your backups and applications hosted on a server in your office, you can have them hosted by your IT service provider in the cloud. This can help you save space in your office because you won’t need a server room, but it can also help save costs because you won’t need to pay for the servers in the first place. Cloud solutions are also incredibly resilient, again reducing risks to your business.

Meet The Author

Name: Samantha Geary
Employment Start Date: August 2017
Job Title: Marketing Executive
Years in Marketing: 3

Check out Sam on Social Media:

Registered in England No. 3082062

2-4 Northfield Point
Cunliffe Drive
Kettering
Northamptonshie
NN16 9QJ

08452 41 41 55

PCS logo

The post 10 Reasons Why You Need an IT Service Provider appeared first on PCS.



source https://www.pcs-systems.com/ten-reasons/

Friday, 31 August 2018

Get Ransom Aware.

Get Ransom Aware.

By: Samantha Geary, Marketing Executive

Ok, let me set the scene…

It’s a Tuesday.

Your commute into work was hassle-free, you have a cup of coffee in hand and you take a seat at your desk ready to start the day.

You turn on your computer, sieve through your inbox and you see that Jack from admin has emailed you. You open it, but it’s just a hyperlink asking you to…

‘Check out this really useful link’.

You click it, it prompts you to enter your log in details, you don’t think twice about it because Jack is a trust worthy guy and he’s always sending you emails. 

 

Then BOOM. You’re greeted by an unfamiliar screen.

As you read on, you realise that you’ve been hit by some kind of cyberattack demanding a ransom in exchange for your data.

You have just clicked a phishing link and opened the doors of your business to a nasty form of malware that can take over your computer.

You have sensitive company data and other important files on your computer that you just can’t afford to lose like:

  • Customer data
  • Vendor information
  • Financial information
  • Payroll information
  • Business plans

You get the picture.

It’s a scenario you don’t want to find yourself in and unfortunately, it’s not an uncommon one.

How does it work?

Ransomware is a form of malware that enables criminals to lock down or encrypt the files on your device. Criminals use ransomware to extort money from you (hence the word ransom) and claim to restore access to your files or device once the ransom has been paid.

Ransomware affects almost 50% of UK businesses. Don’t be another statistic.

Ransomware is just one of the many forms of malware. There are other cyber threats out there so remember to protect yourself and secure your end users. We offer a range of products, services and advice to ensure you’re not just another number.

Active Alerts:

Active Alerts illustration used to represent product

A service which provides ‘hacker checking’ to protect against Brute Force Attack.

Mail Control:

Mail Control

An email continuity service which backs up e-mail, so it can’t be lost and also scans for spam and viruses in email attachments.

Cloud Backup and Disaster recovery:

DR product icon with pink cloud on shield

Being locked out of your system is bad enough so ensure all your files are backed up, so in the event of a disaster (such as Ransomware) you can recover them.

Managed Antivirus:

Managed AV

Maximise protection against hard-to-detect threats and both known and potential viruses. Ensuring your antivirus is always working and up to date.

Cyber Aware
Cyber Aware

This service provides a simulated ‘phishing attack’ and allows us, in conjunction with our customers to recognise where training is needed. We offer guidance where necessary to educate employees on where cyber dangers may lie.

Web Protect:

Web Protect

Block and filter harmful websites.

Managed Encryption:
Managed Encryption product service Logo

Encrypt your devices so data cannot be accessed in the event of loss or theft.

Patch Management:

Patch Management

Keeping your essential system software updated can stop cyber-attacks in its tracks, allowing you to stay secure and up-to-date.

These are very important measures and all businesses should include them in their cyber security plan but without the understanding behind why they are necessary, you’re stuck on square one.


When it comes to cyber threats- prevention is always better than cure.

So step one in your cyber security plan should be prevention.

So, get your team cyber aware.

For more information on any of the services mentioned above or advice on spreading awareness to your team,
click here and get in touch today.

Meet The Author

Name: Sam Geary
Employment Start Date: August 2017
Job Title: Marketing Executive
Years in Marketing  3

Check out Sam on Social Media:

Registered in England No. 3082062

2-4 Northfield Point
Cunliffe Drive
Kettering
Northamptonshie
NN16 9QJ

08452 41 41 55

PCS logo

The post Get Ransom Aware. appeared first on PCS.



source https://www.pcs-systems.com/ransom-aware/

Thursday, 9 August 2018

Cover Your IT Cover!

Cover Your IT Cover!

By: Chris McQuade, Operations Manager

As a business owner, you’ll have a range of things to think about on a day-to-day basis and your IT infrastructure is not usually one of them…

Not because you don’t care or because you don’t deem IT as ‘important’ but because you have so many other things to focus on.

Don’t worry, it happens to the best of us, but imagine if your IT systems went down for 24 hours or worse? Where would that leave your business?

If this is something you’ve never really given much thought to- now’s the time.

What if your offices were flooded and your entire IT infrastructure was ruined?

Sadly, downtime happens to more business than we’d like to imagine because it’s always assumed that IT systems are things that ‘just work’ in the background. As a busy business owner, you’ve got the ‘core’ of your business to focus on. There are so many other important parts to running a successful business and sadly, IT isn’t usually at the forefront of this list.

This isn’t our way of making you feel like you’ve neglected your IT department. It’s our way of opening your eyes to the bigger picture and the situation your business could be left in if your infrastructure wasn’t adequately managed.

So, making sure that your computers, laptops, phones, servers and your systems are all running smoothly and in a safe environment should be high up on your list of priorities.

We already know that technology is a must when you’re running a business. Having an in-house IT team comes with its pros but it also comes with a few downfalls too. Often, you’re faced with higher costs and prolonged downtime due to lack of expertise etc.

Outsourcing can help with these issues.

You may be happy with your current in-house IT department. Outsourcing isn’t for everyone but if you’re considering it, check out some of the following points to learn about the low key advantages of looking beyond your in-house team for IT support.

  • Access to a multitude of expertise
  • Monday- Friday assistance
  • Optional weekend cover
  • Increased Productivity
  • Better staff moral
  • Extension to your current IT department
  • Improved performance
  • Reduced downtime

Let’s say, for argument sake- you have an in-house team, you’re happy with the management of your IT, but what happens when your super smart IT techie goes on holiday for a week? You have hired this individual to cover and support every element of your IT infrastructure and to put it bluntly, your IT systems are left vulnerable when they’re not there.

So, the job of ensuring that you have cover when your employees are away falls upon you. Whether it’s a day, a week, a month. Whatever the timeframe your IT department is left unmanned- the same procedures apply and you’ll need to cover your cover!

It’s difficult to say what kind of trouble your business could be in if your IT department was abandoned for any amount of time, but it’s important to take the necessary precautions.

Our Interim Cover service provides IT management as and when you need it. It allows you to outsource the management of your IT infrastructure to us. Your IT systems will be looked after by professionals which means that you have that extra peace of mind. We know that holiday periods are busy, within the summer months, absences both planned and unexpected happen. These can leave your team short causing extra strain.

Interim Cover reduces the pressure and headache of filling shortfalls until your back up and running to full capacity. We can cover as much or as little as possible so there’s no strain on your productivity.

The best thing about our service is the fact that it’s 100% tailored to you. Meaning, we’ll learn exactly what your business needs and tailor the service around your requirements- ensuring everything you need to be covered is covered!

Not everyone has an in-house team. Sometimes, it’s the business decision maker who takes on the job of managing their own IT. We provide 100% IT management or partial management if you want one less thing to think about. As we tailor our service, we ensure you are getting the best bang for your buck. The most successful businesses are the ones that keep up to date with all the latest technologies and outsourcing to us does just that.

Meet The Author

Name: Chris McQuade
Employment Start Date: Oct 2007
Job Title: Operations Manager
Years in IT: 19

Check out Chris on Social Media:

Registered in England No. 3082062

2-4 Northfield Point
Cunliffe Drive
Kettering
Northamptonshie
NN16 9QJ

08452 41 41 55

PCS logo

The post Cover Your IT Cover! appeared first on PCS.



source https://www.pcs-systems.com/cover-your-it-cover/

Thursday, 2 August 2018

Malware, phishing, spyware and viruses – what’s the difference?

Malware, phishing, spyware and viruses – what’s the difference?

By: Sam Geary, Marketing Executive

Malware, phishing, spyware. These are all terms you’ve probably heard of, but you might not know what the difference is between each of them…

This is understandable considering Hollywood films seem pretty happy to use them interchangeably. You know… where the bad guys are attempting to take down a government with a ‘virus’ or ‘malware’.

Below is a comprehensive look at the difference between these four terms, so next time you go to see the latest blockbuster you can roll your eyes at the use of the wrong term.

Malware

The word ‘malware’ is essentially an umbrella term for a whole range of malicious software. In fact, that’s where the term comes from. It’s a combination of the words ‘malicious’ and ‘software’.

This means malware can include viruses, trojans, adware, spyware, ransomware and all other kinds of malicious programs. This is why you hear malware so often on the news.

Each type of malware does something slightly different, but usually the aim is to make money. Ransomware, for example, encrypts your files and makes you pay to have them decrypted and spyware. Each type of malware differs but we’ll go into detail about that in another blog.

Phishing

… Phishing isn’t actually software, it’s a method of acquiring information. This can involve using malware of course, but the term phishing refers to the actual process of attempting to get information from someone.

Phishing often involves e-mails containing links to websites that are infected with malware. These emails often imitate legitimate companies in order to trick people into clicking on their links or responding with personal information such as passwords and credit card details. Phishing scams are getting more and more believable and therefore difficult to spot- so beware!

Spyware

Spyware is a type of malware that, once installed on a computer, collects information without you knowing. Spyware can be difficult to detect, so it can be almost impossible to know you’ve been the victim of a spyware scam.

You can inadvertently install spyware on your PC by opening a webpage that’s been infected with malware, possibly as a result of receiving a phishing email.

One of the most common forms of spyware is a keylogger which records everything you type on your PC, including usernames, passwords, and bank details.

Viruses

The term virus is actually starting to fall out of fashion. Despite being commonly used throughout the 90s and 2000s, it is slowly being pushed out by the term malware. This is because viruses are considered to be malware. The term malware is more useful because it describes a broader range of malicious programs like adware, spyware, etc.

But if you’re looking for the definition of a virus read on. Computer viruses are aptly named because they’re very much like biological viruses. Viruses are therefore a program that replicates itself in the infected computer’s memory and spreads.

True computer viruses are used far less often now that online criminals have found better ways of spreading malicious code and making money.

So, there you have it – four of the terms that are commonly confused with one another. Although only briefly described I hope this blog has given you some clarity of the terms and what damage they can cause to your IT infrastructure.

Meet The Author

Name: Sam Geary
Employment Start Date: August 2017
Job Title: Marketing Executive
Years in Marketing: 3

Check out Sam on Social Media:

Registered in England No. 3082062

2-4 Northfield Point
Cunliffe Drive
Kettering
Northamptonshie
NN16 9QJ

08452 41 41 55

PCS logo

The post Malware, phishing, spyware and viruses – what’s the difference? appeared first on PCS.



source https://www.pcs-systems.com/different-cyber-threats/