Could your company survive a six-figure fine for data breach?

Heathrow Airport received a £120,000 fine this week for allowing a data breach by way of an un-encrypted USB stick being misplaced and falling into the hands of a national newspaper.

The stick, which contained 76 folders and over 1,000 files was not encrypted or password protected.

“The stick held a training video containing names, dates of birth, vehicle registrations, nationality, passport numbers and expiry, roles, and mobile numbers of 10 individuals involved in a particular greeting party, and also details of between 12 and 50 (exact number unconfirmed) Heathrow aviation security personnel, ” the Information Commissioners Office (ICO) said in its penalty notice.

What did Heathrow get so wrong?

While it’s easy to say that it’s easy to lose a USB stick and that there’s little a company’s directors can do to mitigate such a data breach scenario, in issuing the fine, the ICO also pointed out that less than 2% of Heathrow’s 6,500 staff had even received data protection training.

Other concerns noted during the investigation included the widespread use of removable media in contravention of Heathrow’s own policies and guidance and ineffective controls preventing personal data from being downloaded onto unauthorised or unencrypted media.

This is despite the fact that most businesses now rely more and more on IT to support their activities, and this makes them increasingly vulnerable to threats from hackers, viruses and even from malicious or careless actions their own staff as in the Heathrow case.

How can you ensure your company does not fall victim to data breach?

Having the correct solutions, policies and training in place can make the difference between success and failure for your company – strong IT security has never been so crucial.

Information also needs to be protected if you share it with other organisations. For many businesses, the internet has replaced traditional paper-based methods of exchanging information. It can be sent and received faster, more frequently and in greater volume – but the internet in itself brings its own security issues which businesses must consider.

Having an effective IT security polity in place can help you control and secure information from malicious changes, deletions, data breach, or from unauthorised disclosure.

How we can help

Complete IT Systems has the experience, accreditations and skills to provide your business with the security solutions you need. For more information on how Complete IT Systems can help your business, call us on 0845 873 9631 or contact us and we can call you back.

References

https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2018/10/heathrow-airport-limited-fined-120-000-for-serious-failings-in-its-data-protection-practices/

How Oxfordshire County Council increases security & saves on IT costs

Oxfordshire County Council increases security and cost savings with Microsoft Windows 10 and Enterprise Cloud Suite.

With a need to make sure their IT services could deliver the best service possible to residents, the Council required a service that was future minded with security embedded into it; that’s where Windows 10 and the Microsoft Enterprise Cloud Suite fitted into their strategy.

Find out more in this short video introduction

Want to find out more?

As Microsoft Gold Partners, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

Cut through business complexity with Microsoft Dynamics 365 Business Edition

Find out how your organisation can benefit with this short video – you’ll see how a small business owner uses Dynamics 365 Business Edition to take control of multiple business processes within one powerful seamless solution, resulting in a swift and efficient customer experience.

Want to find out more?

As Microsoft Gold Partners, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

Up to 12,000 prints and no ink cartridges. Too good to be true?

Canon have launched the new PIXMA G-Series range offering incredible page yields and borderless printing. The new portfolio provides high quality, low cost print solutions perfect for all office environments whether your organisation is in education, retail or any other sector.

Best of all, integrated ink tanks make it easy to monitor ink levels, and make it easy to quickly carry out refills in one simple step.

There’s a few days left of the special September pricing offers, so call us today to take advantage of them!

If not having to fiddle around with expensive ink cartridges isn’t enough of a benefit, the G-Series has also been built to be versatile – in any environment. With up to 8.8 ipm Mono Print Speed and borderless printing capabilities the PIXMA range provides your organisation with a high-quality versatile print solution.

Features:

  • High yield – Canon assures quality with its genuine pigment Black and Colour dye inks, developed to work with the PIXMA G Series to deliver outstanding high yield with up to 12,000 prints*
  • Compact design – Space saving, compact design that sits neatly within your home or office without compromising outstanding quality results, every time
  • Integrated ink tanks – Front-facing integrated ink tanks make it easy to keep track of ink levels. Ink is refilled smoothly and quickly using the optimised refill system and easy one-step ink/bottle handling.
  • Pigment black ink – Crisp sharp text and smooth vibrant images every time using high quality pigment black ink and dye based colours
  • Borderless printing – Our high quality dye based colour inks guarantee smooth and natural photos which allows you to enjoy printing borderless 4×6” photos in approximately 60 seconds

Find out more

As Canon Authorised Partners, Complete IT Systems are able to offer you leading guidance on your organisation’s print environment to achieve best value for money, results and reliability. Give us a call today on 01274 396 213 or email  to talk to one of our print specialist team.

Somerset County Council Improves Productivity With Windows 10

A single system outage in a local government agency can have dire consequences for citizens. To ensure operational continuity and meet its budget, Somerset County Council replaced its backup and recovery technologies with a hybrid cloud solution from Microsoft.

Tangible results

As a result, Somerset has optimised operations, boosted agility, and empowered employees. It can restore files and systems in less time, and IT staff can provision infrastructure that supports backups at least three weeks faster. The new solution also costs significantly less to run than previous technologies. Behind the scenes, Somerset backs up 2,790 system streams including VMware virtual machines and Microsoft SQL Server databases with Microsoft Azure Backup Server. IT staff are now adding more workloads and agentless VMware backups. To store and back up employee data, Somerset uses a multi-tiered Azure StorSimple solution.

Continuity of service

Regardless of the day and time, people look to their local governments for leadership and community services, from highway maintenance to programs that support at-risk children and adults. “Our day-to-day operations depend on a lot of mission-critical systems, and we must always be ready to respond to unforeseen events,” says Dean Cridland, Senior IT Officer at Somerset County Council. “For example, we had some serious flooding a few years ago, and our guys had to instantly coordinate efforts with many other agencies. We can’t spring into action like that if our systems are down.”

Check out this short video to learn more about the value Microsoft has provided to Somerset Council.

Want to find out more?

As Microsoft Gold Partners, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

Money for old rope with the £200 Lenovo trade-in!

For a limited time your business can claim a £200 reward per device for trading in old laptops or desktop PCs for qualifying Lenovo ThinkPads.

Not only can you recover some value from your existing business laptops and desktop PCs, but you can also take the opportunity to upgrade your users to Lenovo’s fantastic ThinkPads. Here’s our 6 reasons to choose Lenovo to help you consider your choice.

Lenovo trade in

4 simple steps to claim

It’s a simple 4-step process, and here at Complete IT Systems we can guide you through your trade-in from your initial claim through to the delivery of your shiny new Lenovo ThinkPads. In short, you:

  1. Purchase the qualifying products (click here for the list)
  2. Make your claim with Lenovo within 21 days of your product purchase date
  3. Send back your old devices
  4. Get paid within 21 days of validation, checking the progress of your trade-in at any time with us or on the Lenovo website

Terms and conditions apply. For more details on qualifying products and qualifying trade in devices please visit Lenovo’s Promotions Website.

Want to find out more?

As Lenovo Platinum Solution Partners, Complete IT Systems can offer you expert advice on the Lenovo range and how it could be effectively deployed in your business. To find out more give us a call on 01274 396 213 or email .

 

Frank Sinatra and the VPN

With Bring-Your-Own-Device (BYOD) becoming firmly entrenched in many workplaces in the UK (IDC estimate 90% have some degree of official or unofficial policy for it), we examine the future of the VPN and how it impacts IT departments. As Sinatra famously sang, “and now, the end is near” – well it may be for the good old VPN…

Do you even allow BYOD in your organisation?

On some levels, the rise in personal laptop use in particular should set off alarm bells for any IT manager, particularly those who manage endpoint security. And not all use is official – a report in the Harvard Business Review online reported that the dramatic increase of Bring-Your-Own-Laptop (BYOL) has been in large part unsanctioned by IT. But even if you’ve given BYOD the green light, do you have the right solutions in place in case anyone does ‘Somethin’ Stupid’.

What does this mean for IT?

As you well know, many of the systems in place designed to protect the corporate network and corporate data are rendered obsolete when individual employees work on a personal laptop, and mishaps can lead to financial, reputational, competitive, compliance and legal difficulties for the business.

When employees connect to cloud services on non-corporate devices outside the view of IT, it significantly increases the risk of a data breach. Ask an IT manager why that is, and you’ll probably say that the problem “sits between the keyboard and the chair”. That is, users themselves make unsafe or uninformed mistakes on which links they click on, which apps they allow to access their data, and which sites follow their moves around the web using cookies.

And now the VPN faces the final curtain

All this is to say that when it comes to allowing employees to bring their own laptop, IT must make it as easy as possible to follow security protocols. Traditionally, this has meant requiring a connection to the secure corporate network using a VPN. It’s likely that you have used a VPN at some point in the course of your career, and it’s even more likely the last thing that comes to mind when you think of that experience is “seamless”.

Some have gone so far as to disparage their corporate VPNs as “the worst thing about working remotely” or “the reason I missed that meeting”, as well as harsher comments not fit for print.

It’s safe to say that the days of the VPN are numbered. The elegant solution to the problem of the clunky VPN brings together comfortable user experience and security: a secure browser to access corporate data. For unmanaged laptops, this allows IT to set the parameters of acceptable use and access directly within the browser. Users only need to open a secure browser to get to work.

You can become that the “Ol Blue Eyes” of your users

Your users win….

This intersection between employee productivity and enterprise-grade security is BlackBerry’s sweet spot. With BlackBerry Access, users can simply open the secure browser and reach corporate servers, corporate content, and web-based applications such as Salesforce, from the comfort of their own laptop. Users can also edit Office 365 documents, and work from their tried-and-true productivity apps, such as BlackBerry Work and BlackBerry Workspaces. They can even get work done offline – supporting the dream of working from anywhere – it will be Love and Marriage.

IT win….

From IT’s perspective, this offers a win-win-win situation: users are more productive because their tools are intuitive, corporate data stays secure, and the cost of enabling BYOL goes down because there’s no need for VPN or VDI licenses. This frees up IT time and budget to work on automating and mobilising more complex workflows than the standard email-calendar-contacts trifecta (typical to PIM enterprise apps). We’re not suggesting you go around the office singing “I did it my way”, but it’s one last Sinatra reference at least!

Want to find out more?

As Blackberry Partners, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

British Airways hack – a wakeup call for IT security?

British Airways hack
British Airways hack

As news headlines around the British Airways hack unfortunately continue to prove, IT security has never been more important. With the latest breach seeing nearly 400,000 of the airline’s customers’ credit card details being hacked, cyber security has again become front page news.

With damage limitation now under way, the damage to the company’s reputation, confidence in its booking systems and potential compliance consequences must not be understated.

 

Are your company’s IT security policies fit for purpose?

Businesses now rely more and more on IT to support their activities, and this makes them increasingly vulnerable to threats from hackers, viruses and even their own staff.

Information also needs to be protected if you share it with other organisations. For many businesses, the internet has replaced traditional paper-based ways of exchanging information. It can be sent and received faster, more frequently and in greater volume.

However, the internet brings its own security issues which businesses must consider. Having the correct information at the right time can make the difference between success and failure for your company.

Effective security can help you control and secure information from malicious changes and deletions or from unauthorised disclosure.

How can we help?

Complete IT Systems has been providing security solutions covering a range of needs for many years. We have several top-level accreditations with leading IT security solution providers in order to support your business in the most skilled and knowledgeable way possible.

Kaspersky – SOPHOS – Cryoserver – Watchguard – Barracuda Networks

Callcredit experience rapid growth with Microsoft’s cloud

With the adoption and application of machine learning within Microsoft Azure wedded to elastic compute power, Callcredit are able to use new algorithms and discover ways to improve through greater accuracy and performance in terms of cost control as it provides a much more resilient environment for their business.

Find out more in this short video.

Want to find out more?

As Microsoft Gold Partners, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

How does Microsoft Azure cloud work?

This short video provides a general understanding of how the Microsoft Azure cloud platform works and what’s happening technology-wise behind the scenes.

Azure makes it easy for developers and IT professionals to be agile when they build, deploy, and manage their applications and services.

However, this agility can have unintended consequences if unauthorised resources are created or left running after they are no longer needed. The solution is to use Azure’s resource access management tools as part of your organisation’s governance programmes.

Want to find out more?

As Microsoft Gold Partners, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.