Blog

Will your employees be tricked by email scams and viruses?

31st August 2016

Despite an ever increasing number of online attacks being reported in the media and harrowing new cyber threats like Ransomware being created, many companies are still failing to take effective action to improve their online security. As well as failing to keep their anti-virus software and firewalls up to date, they also fail to educate their workforce on the latest threats – a key part of securing their operations. Phishing scams are one of the most common forms of fraud…

Read More

5 Windows 10 features that can help secure your business

27th July 2016

With Windows 10’s Anniversary Update imminent, all the signs suggest security tools will be expanding. But what are some of the security features that are already proving to be popular? Sign-in options Windows 10 has enhanced passwords with PIN entry and a new ‘Picture’ password included. Alongside the traditional word-based & PIN options, ‘Picture’ passwords are a brand new feature. The ‘Picture’ password is akin to the ‘Pattern Lock’ on Android phones which asks users to swipe their finger to…

Read More

3 ways to speed up your computer that actually work

30th June 2016

A slow computer can be incredibly frustrating but before you fork out for an expensive new laptop or PC computer you should consider trying out a few of these tried and trusted techniques below. Often speeding up your computer can be easier and less costly than you might expect. 1 – Remove bloatware Bloatware might sound fancy or complicated but all it actually refers to is software which you don’t use and therefore takes up unnecessary space, ‘bloating’ your computer.…

Read More

Ransomware is ‘biggest immediate cyber threat’

25th May 2016

A recent report from the security firm Kaspersky Lab has claimed that so called ‘Ransomware’ is now the biggest and most persistent threat to internet security. Their report, which you can read here, acknowledges that there were as many as 2,900 incidents of Ransomware attacks during the first three months of 2016, a 14% increase on the previous quarter. Ransomware is a serious form of malware which locks away a victim’s files and then requests payment to unlock them, usually…

Read More

Chrome scraps support for Windows XP, Vista and more

27th April 2016

Along with the release of Google Chrome version 50 has come the news that support has ended for a number of older operating systems including Windows XP and Vista. Google has been promising since November that they would end support for older operating systems such as Windows XP, Windows Vista, OS X 10.6, OS X 10.7 and OS X 10.8 and this month they followed through with that promise. This means that users who access the Google Chrome browser on…

Read More

Microsoft strengthen Office 365 security

8th March 2016

Responding to the ever growing threat of cyber crime, Microsoft has ramped up their security efforts for their Office 365 platform. Users will now benefit from better visibility, control and security of data when using the cloud based services. In a blog posted on the Microsoft website, Bret Arsenault, Chief Information Security Officer for Microsoft, explained that their new approach “empowers customers to accelerate their adoption of a ‘protect, detect, respond’ security posture”. Office 365 is a cloud based service…

Read More

Whaling – a dangerous new cyber threat

10th February 2016

One of the most recent cyber security threats to come to our attention is the ‘whaling’ scam. This is a highly personalised form of phishing used to trick victims into giving away sensitive information and access to networks. What is it? Most phishing scams target a wide range of people and hackers will send their scam emails to a large number of recipients. However ‘whaling’ is different in that cyber criminals approach one ‘high value’ target with a highly personalised…

Read More

Ransomware: could you be blackmailed by hackers?

5th January 2016

Ransomware is one of the most recent threats to your online security. We look at what it is, how it works and how you can protect your business effectively. What is it? Ransomware, as the name suggests, is a form of malware which locks away a victim’s files and then requests payment from them to have them returned. In 2013, Cryptolocker attacked around 250,000 computers worldwide stealing personal files and refusing to return them unless a ransom was paid immediately,…

Read More

Hackers are taking over LinkedIn profiles – what can you do?

10th December 2015

A recent investigation by the security firm Symnatec has uncovered that hackers are creating fake profiles on the social networking site LinkedIn in an effort to scam users. LinkedIn was established in 2003 and is a social networking site used by over 400 million professionals worldwide as an online form of business networking. As well as allowing businesses to connect with each other, it is also provides a reliable way for recruiters to headhunt potential employees by sending them ‘connection…

Read More

Dell computers admit to security flaw

26th November 2015

Computer giant Dell has acknowledged a “profound security flaw” in computers sold to customers that could leave them open to attacks from hackers, allowing them to harvest important personal data such as bank details. Dell has released a statement which explains that a security certificate ‘eDellRoot’ pre-installed on some Dell laptops has “unintentionally introduced a security vulnerability”. The certificate, which was intended to allow Dell’s support teams to quickly identify a customer’s computer model and provide speedier solutions, could in…

Read More

Get in touch

Can't find what you're looking for or have further questions, please give ECL a call on 01268 575300 or fill out the form below and we will get back in touch as soon as possible...

Please enter your name.
Please enter a valid email address.
Please type your message.

Please check the captcha to verify you are not a robot.

Please check this field.

IT Support

ECL recognises that every client is different, and every client has a different IT support requirement. Whatever the size of your business, we can offer a support scenario to suit your needs.

Cloud Services

Whether your business already uses Cloud services or you’re considering the Cloud as a possible way forward, talk to us first. We can provide anything from fully hosted IT infrastructures on our own ECL Private Cloud, to simple on-line backups. We can also give expert advice on Office 365 and other Cloud platforms.

Disaster Recovery

How would losing access to your IT systems and data for days, or even weeks, affect your business? For many if not most companies this would be a nightmare scenario, with potentially very serious consequences.

Office 365

Cloud services could potentially lower your overall costs and gives your employees all the tools they need alongside the correct layers of security and compliance.

Client reviews