020 8995 2914

Managing Technology for your people

Blog

Cyber Attacks – What Lessons Must Be Learned?

Cyber Attacks – What Lessons Must Be Learned?

Back in May 2017 a cyber attack that came to be dubbed WannaCry hit computer systems worldwide and caused panic among a huge number of organisations across the globe. One of the highest profile victims of these attacks was the NHS in the UK but there were

Read more

Breaking News: CEO/CFO Fraud – is this happening to you?

Breaking News: CEO/CFO Fraud - is this happening to you?

How sure are you that your CEO or CFO is not being hacked right now? Are your 100% sure of that? Organisations are often vulnerable to hacking not because they haven’t got good anti-virus or anti-malware protections in place but simply because hackers and fraudsters are so

Read more

The Dangers Of Letting An External Person Use Your WiFi Network?

The Dangers Of Letting An External Person Use Your WiFi Network?

Let’s paint a picture. An external consultant visits your office for a meeting and wants to show you a web site in action but in order to do this they need to connect to your network WiFi. You happily allow the consultant to do this. After all,

Read more

What You Need to Know about Ransomware

What You Need to Know about Ransomware

Ransomware is one of those cyber security terms that a lot of people have heard of but not so many people are familiar with – until it’s too late! So what is it and what should you know? In essence, ransomware are forms of malicious software which

Read more

How to Make Your Data and Your Business Safer

How to Make Your Data and Your Business Safer

The expansion of internet connectivity and what is possible online means there is now an incredibly broad range of activities that can be carried out on the move and from virtually anywhere. One obvious consequence of all this is that more of us can carry out our

Read more

Two-factor authentication and your IT security

Two-factor authentication and your IT security

I’m often asked about two-factor authentication and whether it is necessary or helpful when it comes to business IT security. Well the simple answer to that enquiry is yes – two-factor authentication is definitely an option worth considering if you’re keen to enhance the security of the

Read more

Staying connected with Hosted telephony

Staying connected with Hosted telephony

Businesses in any field always need to be on the lookout for ways in which they might improve their efficiency levels and do more with the resources they have at their disposal. One area in which there are clear gains to be made for enterprises of all

Read more

Why anti-virus software will not always be enough

Why anti-virus software will not always be enough

Did you know that only 75% of PC users today use anti-virus software? So that means that 25% are not and that’s a figure that is far too high. To put it another way, for every 10 people you communicate with electronically between two and three of

Read more

What is Cloud Computing and why should I use it?

What is Cloud Computing and why should I use it?

Recently I have had a number of solopreneurs sign up for our Firestarter Package and there are two questions I’ve been asked again and again – ‘What’s the cloud?’ and ‘Is it something I should be using?’ Now, if you are in the IT industry then you

Read more

Should you open that alarming email?

Should you open that alarming email?

You feel devastated, violated, helpless and angry. You don’t know how this happened and you are looking for answers. Picture the situation – you go into your email account and there’s a worrying email from your bank or payment solution provider. You open the email and you

Read more
Page 1 of 3123

BLOG POSTS

Address

Vanguard Business Centre
Alperton Lane, Greenford
Middlesex
UB6 8AA
Telephone: 020 8995 2914
Fax: 020 8788 2914
Email: mail@sca-group.co.uk

PRIVACY POLICY

TERMS OF USE