Blog
Dubbed a ‘mega-leak’, more than 2.2 billion stolen emails and passwords have surfaced online in a leak that is growing bigger by the day. First reported on January 17, 2019 by researcher Troy Hunt, the leak included an astonishing number of email addresses and password combinations. However, upon further investigation the list of breached data was even bigger than first suspected, with 2.2 billion user’s worth of data included. The data is apparently an amalgamation of leaked email addresses and…
Read More2018 brought with it many major cyber-crime attacks over the year. A number of global businesses and industries fell victim to data breaches including the likes of Facebook, Under Armour, MyHeritage and the Marriott Hotel Group – even the French President, Emmanuel Macron, had his emails hacked! Together with increasing levels of ransomware and malware attacks, cyber security is rightly at the top of many business agendas in 2019. Here are what some of the world’s top experts are predicting…
Read MoreA recent report from cyber security company Sophos has uncovered some disturbing trends in the advancement of online crime. The report found that teams of online criminals are now turning to targeted ransomware attacks as a means of earning millions of dollars from businesses and high-value individuals. The report by SophosLabs also suggested that cyber criminals are manipulating flaws in Windows systems admin tools as a means of stealing sensitive information and of delivering ransomware. Once activated, the ransomware will…
Read MoreVirtual desktop infrastructure. Even the name itself can sound confusing. But the benefits of VDI are well worth the small amount of time it takes to understand what it is and how it works. Read on to find out more. What is VDI? VDI can be simply described as a type of technology that detaches the application processing from the physical computer in front of you. Rather than running applications on the computer under your desk, you will instead run…
Read MoreFollowing on from headline claiming malware like Petya, NotPetya and WannaCry, a new threat to computer users has emerged in the form of an all-in-one malware called X-bash. What is X-Bash? Researchers at Palo Alto Networks have named this new form of malware X-bash. They claim it combines bot net, cryptocurrency mining software and ransomware in one singular worm that specifically targets users of Linux and Windows. Who created it? The researchers, named ‘Unit 42’, have claimed that the malware…
Read MoreAlong with threats like Meltdown and Spectre, Foreshadow has been in the news recently, described as a worrying threat for PC’s with intel processors. Meltdown and Spectre, which were first publicly disclosed in January, were a widespread problem and some of the aftermath is still being cleaned up. However, the discovery prompted researchers to do further studies into possible weaknesses and vulnerabilities, and in doing so discovered a weakness similar to Spectre in Intel processors. Known as SGX, Intel’s Software…
Read MoreBusinesses are encouraging staff to be extra-vigilant after an increase in malicious content distributed through social media. Social media websites are documenting a rise in falsified articles that use notable fake news stories to encourage people to click. Once they land on the website however, they can be susceptible to a whole range of malicious content like malware and viruses. Two recent examples of these hoax-type stories include an article purporting the death of popular Mr. Bean actor Rowan Atkinson…
Read MoreTechnology is rapidly changing the way that we work. From industry giants to young and hungry start-ups, modern devices, programs, tools, systems and support is enabling businesses to thrive in an ever-changing market place. One of the biggest changes has come in the form of not only how we work but also the way we work. While many businesses have traditionally operated out of office-style set ups, following the usual 9-5, Monday to Friday shift patterns, over the past decade…
Read MoreOutsourcing is common place in the business world. Take a look at some of the biggest Fortune 500 companies like IBM and Siemens, both of whom benefit from the knowledge and expertise of other businesses to help them maintain their high standards of operation. However, outsourcing isn’t and shouldn’t be restricted to only those businesses who have already established themselves. Here are a few reasons why start-ups should also consider outsourcing certain duties such as IT support. CostOne of the…
Read MoreIn the face of growing danger from cyber threats such as ransomware and phishing, Microsoft have released an upgraded set of features for their Microsoft 365 business edition in the hopes of safeguarding small businesses. Microsoft has said that Microsoft 365 Business will now include sophisticated scanning of attachments and AI-powered analysis to uncover and destroy malicious messages. The updates also include automatic checking of links in emails and full device protection to prevent devices from accessing ransomware and other…
Read MoreIT Support
ECL recognises that every client is different, and every client has a different IT support requirement. Whatever the size of your business, we can offer a support scenario to suit your needs.
Cloud Services
Whether your business already uses Cloud services or you’re considering the Cloud as a possible way forward, talk to us first. We can provide anything from fully hosted IT infrastructures on our own ECL Private Cloud, to simple on-line backups. We can also give expert advice on Office 365 and other Cloud platforms.
Disaster Recovery
How would losing access to your IT systems and data for days, or even weeks, affect your business? For many if not most companies this would be a nightmare scenario, with potentially very serious consequences.
Office 365
Cloud services could potentially lower your overall costs and gives your employees all the tools they need alongside the correct layers of security and compliance.