Blog
An annual cyber-security report by technology firm HP has found that despite advancements in cyber attacks, the majority of cyber-security incidents in 2014 took advantage of well-known vulnerabilities that have existed for years. The report, which looked at a range of business that had their security compromised in the least year, found that many of the issues which led to their security breaches are not new developments and that they exploited code written years or even decades earlier. “We can’t…
Read MoreA rule forcing Microsoft to offer new Windows users in Europe options for web browsers has come to an end, five years after it was introduced. The so called Browser Ballot had forced Microsoft to give as much prominence to non-Microsoft browsers such as Firefox and Chrome on Windows as it does to Internet Explorer (IE). The deal had supposedly been about giving Windows users choice, and was drawn up in 2009 after rivals of Microsoft complained that because IE…
Read MoreOne of the most sophisticated pieces of computer spyware ever seen has been discovered by the leading computer security company, Symantec. The bug goes by the name Regin and has been dubbed “super-spyware”. It was probably created by a government according to Symantec, due to how sophisticated it is. They believe it would have taken years to create and that it has probably been used for about six years, since at least 2008, against a range of targets around the…
Read MoreAnyone still using Microsoft Windows Server 2003 is being urged to upgrade after Microsoft announced that they will no longer offer extended support as of July 14th 2015. But what does this mean to current users and why should they switch? It’s estimated that there are currently 10 million machines still running Windows Server 2003 (WS2003) at present, and users who have failed to upgrade by next July to a newer server will unfortunately find themselves in hot water. Users…
Read MoreThe discovery of a major new computer bug was announced yesterday, which has the potential to affect Mac and Linux users. Shellshock has been described as a “deadly serious” bug, and “about as bad as it gets”. It has the potential to affect hundreds of millions of computers, servers and devices. It can be used to easily take remote control of almost any system using a software component called Bash. Bash stands for Bourne-Again Shell. It is a command prompt…
Read MoreMicrosoft officially stopped supporting the Windows XP operating system on 8th April this year after more than a decade. This means that it no longer provides technical support services, but more importantly it also stopped updating the software. So, no more bug fixes, and most crucially of all, no more security patches. Desktops or laptops still using the XP operating system are now much more vulnerable to cyber attacks as a result. XP hasn’t updated since 8th April 2014, which…
Read MoreIT Support
ECL recognises that every client is different, and every client has a different IT support requirement. Whatever the size of your business, we can offer a support scenario to suit your needs.
Cloud Services
Whether your business already uses Cloud services or you’re considering the Cloud as a possible way forward, talk to us first. We can provide anything from fully hosted IT infrastructures on our own ECL Private Cloud, to simple on-line backups. We can also give expert advice on Office 365 and other Cloud platforms.
Disaster Recovery
How would losing access to your IT systems and data for days, or even weeks, affect your business? For many if not most companies this would be a nightmare scenario, with potentially very serious consequences.
Office 365
Cloud services could potentially lower your overall costs and gives your employees all the tools they need alongside the correct layers of security and compliance.