020 3151 6000

hello@priorityoneit.co.uk

How to protect your business from a cyber security attack

Posted by
How can you make sure that your business is able to survive any potential threats to its online presence? IT security specialist Javvad Malik of j4vv4d.com gives his tips for small business owners on how to prevent a cyber-attack and protect their companies in this special video series. What should an SME do if a [...]

Our top 10 Security Attack Horrors of all time

We live in a world where cyber-attacks dominate the headlines. Be it a teenager in his basement or a government agency trying to obtain your data, the Internet landscape has been transformed into a binary battlefield. Who needs a gun when you have a keyboard? Here are the top ten security attacks horrors in history. [...]

Advancements in IT Security: How the Good Guys Are Beating the Bad

Posted by
Is it just us, or does it seem online hacking crimes are on the up? It was only last week that The Guardian reported the entire US political system was ‘under attack’ by Russian hacking. This following on from the news being awash with Russian hackers acquiring and posting the private medical notes of Olympians. [...]

Is a huge Global Malware attack pending?

Posted by

Over the past week we have seen a massive increase in attempted malware attacks via email.  Is this linked to the huge increase in malware which Symantec have seen throughout January 2016?  If the malware is successful in infecting your machine it starts attempting to steal banking and other personal information. What do you need […]

Encryption, a vital part of your business

Posted by

Encryption is one of the vital parts of today’s IT infrastructure in every business, no matter what type or size. Yet it’s not implemented as much as it should be and the main reason is because of the word itself. For many, the word encryption is difficult to understand, tricky to apply and hard to […]

Corporate Web Proxy, more than just a porn filter!

Posted by

Back in the late 90’s when the Internet was just starting out companies began introducing Web Proxies or filters.  The purpose of these was to ensure that the small amount of bandwidth (yes 1Mbps was fast then!) was utilised purely for business purposes.  This meant no Facebook, music downloads, games or other non-related business activities. […]

Don’t let hackers spoil your Christmas

Posted by

We have short-listed a selection of security best practices when it comes to creating passwords to help keep your data safe and secure over Christmas and into the New Year. Use a minimum of eight digits. Have a mix of letters (upper and lower case), numbers and symbols. Do NOT use anything to do with […]

The accelerating growth of ransomware

Posted by

What is ransomware? As the name suggests ‘ransomware’ is a malicious software that denies a user(s) access to data stored on a Local PC, Server and now mobile devices, this data will be held to ransom until a fee has been paid. Types of ransomware Encryptor Ransomware – Files will be deleted once they are encrypted, generally […]

Lock Your Computer – It’s Simple IT Security

Posted by

We are proud to be a company that implements an Information Security Management System compliant with ISO 27001:2013. As a result we have many policies and procedures in place to increase the security of our environment, and advise our clients to follow the same best practice. It can be difficult to balance system security and system usability, which is why […]

Making Password Management Easier

Posted by

As mentioned at the end of my last blog, this instalment is going to look at three key products for securely storing multiple passwords: PasswordSafe v3.34.1, KeePass v2.28 and Dashlane 3.0.7 (Free version). I’m going to focus my attention on the security of each application, but will also touch on usability and any additional features I feel […]

Page 1 of 2 1 2