Blog

British businesses warned to stay vigilant in the face of Ransomware attacks

28th March 2018

A new report from security watchdog SonicWall has confirmed that the threat of Ransomware is greater than ever in the UK and that British businesses in particular should sit up and take note, with over 38 attacks every day on UK based companies and organisations. What is Ransomware? Ransomware is a form of malware which locks away a victim’s files and then requests payment to have them returned. Ransoms are paid through a digital currency such as Bitcoin, which allows…

Read More

Nearly half of all global login attempts are made by hackers

26th February 2018

The content delivery network Akamai has claimed that 43% of all online login attempts are performed by cyber criminals attempting to compromise accounts of businesses and corporations. A recent report from Akamai has revealed that almost half of all online log in attempts are “malicious”. In its report ‘Q4 2017 State of the Internet/Security report’ the company provided research that claims an overwhelming number of log in requests are “attempts to log in to an account using password guessing software…

Read More

Apple confirms security flaw in almost all its products

5th January 2018

Tech giant Apple has confirmed two major bugs found across almost all of it’s devices including iPhones, Macbook Pro’s, iMac Pro’s, Macbook’s, iMacs and iPad devices. Apple has said the two issues known as “spectre” and “meltdown” are believed to affect “nearly all computing devices and operating systems” with only the Apple watches believed to be immune. Meltdown is said to affect Intel processors, which are commonly found in Macs. It could in theory allow malicious software or hackers to…

Read More

Keyloggers found on HP laptops

11th December 2017

Recently we wrote about the dangers of keyloggers, a dangerous piece of software that can track everything you type in to your keyboard. The seriousness of the threat posted by keyloggers has been highlighted today in a report by security researcher Michael Myng. The report, which can be viewed here, found that hidden keylogger software was pre-installed on the systems of hundreds of HP laptop models. According to the report, as many as 460 models of HP laptops had been…

Read More

Is it time for you to outsource your IT support?

23rd November 2017

Every business will at some point encounter IT problems. Not only do businesses need to maintain systems that work swiftly and accurately, but they also need to make sure that they are safe and secure from cyber threats. To keep things moving, it is important to have someone on hand to help. Let’s look at some of the reasons why you should work with a trusted IT support company. The cost factorWhile in the early stages of your business it…

Read More

KRACK Attack: How safe is your WiFi connection?

30th October 2017

A disturbing flaw in Wi-Fi networks has allowed for hackers to eavesdrop on data being passed through most modern Wi-Fi networks. This means that any device, from laptops and mobile phones to games consoles and tablets, could all be vulnerable to hacking with credit card numbers, passwords, chat messages and emails all potentially under threat. Known as a key reinstallation attack or KRACK for short, this newly discovered flaw was unearthed by Marty Vanhoef, a Belgian researcher. What’s more, the…

Read More

This hidden programme could be capturing everything you type

25th September 2017

You might not realise it, but your computer could be infected with a form of malware which collects everything you type into your keyboard. Throughout the day it could harvest passwords for your banking, social media accounts and other personal information –which could lead to identity fraud, blackmail and more. What is a key logger? The programme in question is called a keystroke logger – or a key logger for short. While these programmes can sometimes be used for honest…

Read More

How prepared are you for a massive data loss?

29th August 2017

The ability of a business to recover quickly from an IT disaster cannot be underestimated. Getting back on your feet in a speedy manner can help avert financial loss, harm to reputation and other negative impacts. While we all hope that our own businesses will never be affected by disruptive incidents like cyber attacks, theft, fire or flooding, they can happen and failing to prepare is preparing to fail! A good place to start when considering how prepared you are…

Read More

Ransomware here to stay says Google

31st July 2017

Businesses are being warned to protect themselves after tech giant Google released research claiming that cyber thieves have extorted a total of £19m from ransomware since 2015. At a talk at the Black Hat security conference in Las Vegas, Elie Bursztein from Google revealed the results of research conducted with Chainalysis, the University of California and New York University which looked at bitcoin transactions over the period. It concluded that ransomware has become a “very profitable market and is here…

Read More

Windows 10 update to make Ransomware attacks more difficult

30th June 2017

Controlled Folder Access – that’s the name of a new feature coming to Windows which could add extra protection against dangerous Ransomware like WannaCry and Petya. News coming from technology website The Verge says that Microsoft will include a special tool in their next major update expected in September. The ‘Controlled Folder Access’ option which will be found in the Windows Defender Security Centre will offer users an option to ‘protect their files and folders from unauthorized changes by unfriendly…

Read More

Archives

Get in touch

Can't find what you're looking for or have further questions, please give ECL a call on 01268 575300 or fill out the form below and we will get back in touch as soon as possible...

Please enter your name.
Please enter a valid email address.
Please type your message.

Please check the captcha to verify you are not a robot.

Please check this field.

IT Support

ECL recognises that every client is different, and every client has a different IT support requirement. Whatever the size of your business, we can offer a support scenario to suit your needs.

Cloud Services

Whether your business already uses Cloud services or you’re considering the Cloud as a possible way forward, talk to us first. We can provide anything from fully hosted IT infrastructures on our own ECL Private Cloud, to simple on-line backups. We can also give expert advice on Office 365 and other Cloud platforms.

Disaster Recovery

How would losing access to your IT systems and data for days, or even weeks, affect your business? For many if not most companies this would be a nightmare scenario, with potentially very serious consequences.

Office 365

Cloud services could potentially lower your overall costs and gives your employees all the tools they need alongside the correct layers of security and compliance.

Client reviews