Advanced security for Microsoft Office 365

Although it may be tempting to think that with data in the cloud your business isn’t susceptible to data loss, it’s still vital to add an additional security layer to protect email from spam, phishing, ransomware and other advanced cyber threats. In fact, nowadays malware is usually sent via email and hosted on cloud storage…

Cybersecurity in the workplace – educate & protect your users

Employees are of course your company’s most valuable asset, and grow revenue, build relationships with clients, and, make the business function. They also have an invaluable role to play in the firm’s security perimeter. Cybercriminals, however, are more likely to view your employees as the path of least resistance into an organisation. Indeed, two of the top…

The perfect solution for Windows 10 migrations

Kingston’s Desktop/Notebook Memory and Business Solid-State Drives (SSD) are the perfect enterprise client combination for your Windows 10 migration and system update deployments. The UV500 family of solid-state drives dramatically improves the responsiveness of your existing system with incredible boot, loading and transfer times compared to mechanical hard drives. Powered by a Marvell 88SS1074 controller…

Why you can trust your business data with encrypted USBs

In recent weeks we’ve been discussing the benefits of using encrypted USB to safeguard your business data. But what is it about encrypted USBs that makes them stand out above other data security solutions? Here we lift the lid on how Kingston’s IronKey D300 USB Flash drive features an advanced level of security that safeguards…

USB drives – 4 steps to reducing the business risk

USB drives are the tried and trusted faithful companion in professional life. They were around long before cloud-based file storage, sync and share platforms, they don’t rely on WiFi connections, and they are just an easy way of getting data from A-to-B. What’s not to love? There’s a ‘but’… It shouldn’t be news by now,…

How cyber criminals use email to attack businesses

Email account takeover and lateral phishing represent a growing threat to enterprise UK businesses. In this blog we look at recent findings into Spear Phishing and how it can be used to take over business email systems and access critical data. How do cyber criminals exploit businesses? Attackers follow four primary strategies to choose target…