Firewalls are a protective barrier between your computer, phone or tablet and the other computers that are connected to you. As soon as you are connected to the internet, the whole world can see you and this can make your computer vulnerable to cyber threats. When data is exchanged between computers it goes into cyberspace. Firewalls monitor this data to decide whether it is safe, and therefore firewalls are essential! If your computer is left unprotected, it can quickly be…Read More
Cloud computing is everywhere and has definitely become part of our daily lives. Whether you are watching films, listening to music, editing documents or checking your email, you are already using it. Cloud computing is about storing data on the internet rather than hard drives, meaning you can store unlimited amounts of data over the internet which was impossible before. How can your business benefit? There are many reasons why many businesses across the world are using Cloud computing. Here…Read More
It can be extremely frustrating when your computer is slow as it can reduce your productivity and make you job harder. There are many reasons why your computer may be slow, some of which are simple and easy to avoid. 1. Your hard drive may be failing This can happen over time as a hard drive is constantly moving and, as with anything that consists of moving parts, they can eventually wear down. How to fix: Run a hard drive…Read More
Recently we wrote an article detailing predictions from some of the world’s top experts including McAfee and the World Economic Forum forecasting greater levels of hacking and phishing in 2019. Well it appears that we have the first major casualty of 2019 with a major hack of UK firm Kwik Fit’s computer network. The popular car service specialist has over 600 garages across the United Kingdom and Ireland and provides tyres, exhausts, batteries and breaks as well as MOT testing…Read More
A new report has produced findings in which it claims that a coordinated global cyber attack could cause economic damage of between £65-96 billion. In the hypothetical scenario developed for Lloyds of London and Aon, findings showed that a malicious campaign similar to those of real-life ransomware (such as WannaCry and Not Petya) could spread around the world incredibly quickly and cause devastating damage in its wake. The scenario involved an infected email which once opened forwards itself to all…Read More
Dubbed a ‘mega-leak’, more than 2.2 billion stolen emails and passwords have surfaced online in a leak that is growing bigger by the day. First reported on January 17, 2019 by researcher Troy Hunt, the leak included an astonishing number of email addresses and password combinations. However, upon further investigation the list of breached data was even bigger than first suspected, with 2.2 billion user’s worth of data included. The data is apparently an amalgamation of leaked email addresses and…Read More
2018 brought with it many major cyber-crime attacks over the year. A number of global businesses and industries fell victim to data breaches including the likes of Facebook, Under Armour, MyHeritage and the Marriott Hotel Group – even the French President, Emmanuel Macron, had his emails hacked! Together with increasing levels of ransomware and malware attacks, cyber security is rightly at the top of many business agendas in 2019. Here are what some of the world’s top experts are predicting…Read More
A recent report from cyber security company Sophos has uncovered some disturbing trends in the advancement of online crime. The report found that teams of online criminals are now turning to targeted ransomware attacks as a means of earning millions of dollars from businesses and high-value individuals. The report by SophosLabs also suggested that cyber criminals are manipulating flaws in Windows systems admin tools as a means of stealing sensitive information and of delivering ransomware. Once activated, the ransomware will…Read More
Virtual desktop infrastructure. Even the name itself can sound confusing. But the benefits of VDI are well worth the small amount of time it takes to understand what it is and how it works. Read on to find out more. What is VDI? VDI can be simply described as a type of technology that detaches the application processing from the physical computer in front of you. Rather than running applications on the computer under your desk, you will instead run…Read More
Following on from headline claiming malware like Petya, NotPetya and WannaCry, a new threat to computer users has emerged in the form of an all-in-one malware called X-bash. What is X-Bash? Researchers at Palo Alto Networks have named this new form of malware X-bash. They claim it combines bot net, cryptocurrency mining software and ransomware in one singular worm that specifically targets users of Linux and Windows. Who created it? The researchers, named ‘Unit 42’, have claimed that the malware…Read More
ECL recognises that every client is different, and every client has a different IT support requirement. Whatever the size of your business, we can offer a support scenario to suit your needs.
Whether your business already uses Cloud services or you’re considering the Cloud as a possible way forward, talk to us first. We can provide anything from fully hosted IT infrastructures on our own ECL Private Cloud, to simple on-line backups. We can also give expert advice on Office 365 and other Cloud platforms.
How would losing access to your IT systems and data for days, or even weeks, affect your business? For many if not most companies this would be a nightmare scenario, with potentially very serious consequences.