A simple switch from analogue to digital solutions

Get more done in less time with Philips digital voice recorders.

Productivity

Users can overwrite, insert, append, delete and mark their recordings as urgent.

Efficiency

Superior sound quality leads to less time to type documents, reducing backlog.

Security

Analogue tapes can easily get damaged, lost or stolen exposing client confidential data.

File management

Philips SpeechExec software gives you clear overview of the job queue, who created what and which recordings are priority.

Mobility

The digital system removes geographical boundaries as work can be dictated anytime from anywhere and be sent for typing.

Save money

No need to courier or ship cassette tapes around which cost extra money.

Click here to view the product brochure.

Business IT security – the challenges & solutions

Small and medium sized businesses are exposed to the same cyberthreats as everyone else is, and they need protection. But we get it – it’s not easy striking the right balance with your cyber defences; consumer cybersecurity products are insufficient, and yet enterprise solutions are too costly and complicated.

Small business IT security

At best, an small and medium sized businesses might have an IT team including someone who is responsible for cybersecurity. But IT is a lot more than cybersecurity, and one person doing it all cannot devote much time to managing a heavy security solution. However, even that is a best-case scenario for small business IT security. According to our research, some businesses dedicate the role of security management to non-specialist internal staff — and some companies have no cyber security function at all.

In the age of cyber attacks ranging from everything from networks to USB sticks, it’s not an option to leave your business unprotected.

I’ve seen the news, but why is cyber security so important to my small business?

Businesses of all sizes can fall prey to a variety of malware and social engineering attacks such as phishing. Here are some of the business assets that it’s wise to protect when thinking about your small business IT security strategy.

Your money

Financial fraud is still one of the most damaging types of attacks. Our solutions have a Safe Money subsystem that can protect your finances from scammers. It ensures that you access only genuine, secure financial sites, and it protects your financial data from unauthorised applications and unsafe browser extensions.

Your data

Your business information is another primary target for cybercriminals. That is why our solutions allow encryption of files and folders, and also includes an automated backup and restore feature to protect your data from cryptomalware.

Your software

Our solution can help keep your business applications up to date. By running a scheduled search for application updates, it decreases the risk of cybercriminals exploiting unpatched application vulnerabilities.

Your passwords

Part of our small business solutions is a module called Password Manager, which can store passwords, bank account details, document scans, and text notes in a secure vault.

Your server

In case you need it, the Small Office Security feature can be installed on the server and protect it as well as a workstation.

So what’s the solution? Is there one?

The good news is that SMB IT security is made easier with the right solution.

Based on the above, Kaspersky’s small business solutions are tailored to provide the following benefits:

  • Efficiency
  • Simple deployment
  • Easy management
  • Intuitive interface
  • Nothing in excess

As a result, you do not need to be a security specialist or even an IT professional to install or manage Kaspersky Small Office Security. The small business IT security solution provides out-of-the-box protection from most relevant cyberthreats and can be managed by almost any office employee (or ourselves at Complete IT Systems if you prefer). The Web console provides all information necessary for managing cybersecurity: information about licenses, users, devices, product versions, and so on. The main protective subsystems do not need much attention, so your employees can concentrate on their day jobs instead.

Find out more in this short video

Want to find out more?

As Kaspersky Platinum Partners, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

The small hero of local storage

Down to earth, solid and secure

Keeping your organisation’s data in the Cloud isn’t always the only and right option. It’s more about finding an approach that suits you.

A survey in various countries across Europe has revealed that despite the opportunities that the Cloud offers, about 90% of employees still use USB drives to transport data. This is for good reason, as USB drives:

  • Allow you to work independently without the need for internet & Cloud access
  • Require a one-off investment only and don’t require any maintenance
  • Don’t need a lengthy set-up and contract

The nuclear option!

Yet we also know that many organisations lock down USB ports and ban their employees from using them. This isn’t always a sensible solution, as it limits flexibility and can encourage employees to search for workarounds such as private email or Cloud services.

Smart alternatives to the nuclear option of locking down USB ports include:

  • Rolling out encrypted USB drives company-wide to provide your users with the secure file sharing solutions they need to do their job quickly and effectively
  • Integrating encrypted USB drives into your companies’ security strategy and architecture via endpoint management
  • Educating your employees on data security and training them on how to use USB drives securely

Kingston’s encrypted USB drives come with a variety of customisation options that make them fit with your organisation’s security needs, strategy and policies.

How we can help

Complete IT Systems and Kingston Technology have the solutions, experience, accreditations and skills to provide your business with the security solutions you need. For more information call us on 01274 396 213 or contact us and we can call you back.

Driving Ferrari’s true cybersecurity

Connect, detect, protect.

When you’re one of the world’s most iconic brands, driven by the most successful team in Formula 1 history and people’s safety depends on the accuracy and availability of your data, you can’t afford to take risks. That’s why Ferrari trusts Kaspersky Lab to take care of its cybersecurity.

From its world-famous Maranello factory to the Formula 1 circuit, more than 5,000 Ferrari endpoints and systems globally are secured by the world’s IT Security specialists, Kaspersky Lab.

And as both companies’ technological vision and innovation extend to connected cars, Internet of Things and a constantly evolving web presence, Kaspersky Lab is deepening its technology partnership with Ferrari, delivering protection that extends beyond devices to the data itself, 24 hours a day, seven days a week.

“Though we work in very different industries, we’re united by the same core business values: technological leadership and a passion for innovation and getting forever better at what we do,” says Kaspersky Lab founder and CEO, Eugene Kaspersky. Speed, security, cutting-edge innovation…great ingredients for deepening a great partnership.

Always-on cybersecurity – everywhere.

In addition to the more than 300,000 unique pieces of malware Kaspersky Lab experts uncover every day, new threats are evolving all the time. As cyber criminals develop tools individually tailored to each victim, indicators of compromise are no longer enough on their own to help organisations detect attacks. The continuing march of ransomware and distributed denial of service (DDoS) attacks have joined with device integrity in an Internet of Things landscape to introduce new areas of vulnerability, particularly in manufacturing environments where new-found connectivity isn’t always accompanied by cybersecurity awareness.

In this environment, knowing where you’re vulnerable is as important as your ability to detect and prevent cyber-attacks. Rounding this self-awareness out with the latest threat intelligence to help anticipate what’s around the next chicane is vital for an organisation with Ferrari’s profile and reputation.

They need a security partner that doesn’t just keep pace with the latest threats, but stays ahead of them – while anticipating the vulnerability profile of the most innovative digital technologies. That’s why Ferrari chose to deepen its partnership with Kaspersky Lab. In addition to protecting traditional areas of company technology such as endpoints, ERP and PLM, Kaspersky Lab now works with Ferrari to protect its digital world through penetration testing, vulnerability assessment and threat intelligence.

Protecting the brand, ensuring availability

With a global web presence and a valuable brand to protect, it was critical that the company trusted to do this was not only global in reach, but global in its threat intelligence and analysis capabilities and expertise. Kaspersky Lab, already a trusted partner in protecting Ferrari’s endpoint ecosystem, was put through its paces and, once again, was the perfect fit to protect the company’s digital presence.

Defence against known web exploits, paired with threat intelligence and vulnerability assessment to anticipate and mitigate threats before they become a problem, is now another layer of Kaspersky Lab’s cybersecurity helping to protect one of the world’s biggest brands. On-demand scanning with minimal performance impact, protection from DDoS attacks, the capacity to provide actionable threat intelligence within strict platform specifications and complete confidentiality in reporting…just a few of the reasons Kaspersky Lab made it to Pole Position in Ferrari’s rigorous tests.

True security without compromise

But it doesn’t stop at the web: overall availability of systems, infrastructure and the applications running on them is of vital importance, but so is performance: “Performance, as you can understand, at Ferrari is very important, so we need to ensure security without compromise,” says Chief Technical Officer, Francesca Duri.

Tasked with ensuring the availability of the IT infrastructure for Ferrari’s manufacturing plants, Duri says Kaspersky Lab’s industrial cybersecurity solutions set it apart in a market where few mainstream vendors can offer this kind of expertise: “I was surprised in a very positive way when, working with Kaspersky, I learned that they already have solutions for security in this area. That’s the reason we’re working together and why we will keep working together to make sure the same level of cyber security applies to all the business areas.”

High performance under pressure gives you an edge

Ferrari operates one of the most sophisticated production lines in the world, where high levels of automation combine with precision techniques, test data and more than 2,000 employees to form a complex, high-value infrastructure with unique security requirements.

And that’s before you factor in the demands of a race weekend: with over 60Gb of data per car accumulating over the course of a race and multiple, real-time simulations using that data at the track, there’s a lot at stake.

“One of the advantages we’ve found in the collaboration with Kaspersky is their availability to follow our needs,” says CIO Vittorio Boero. “Kaspersky is a company I selected to work with in 2012 when I arrived here in Ferrari.” Like all the best relationships, this is one that continues to grow and evolve around shared vision, understanding and expertise.

Want to find out more?

As Kaspersky Platinum Partners, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

It’s not only Halloween that’s spooky…. cyber threats happen all year round

Your time is precious. Your business is just as important. At Complete IT Systems and Kaspersky, we are committed to protecting both. We protect your business from cyber threats with easy-to-deploy and easy-to-administer solutions that help you focus on essentials, such as revenue generation.

Kaspersky protects what matters most to your business, regardless of your level of IT proficiency.

Continuous security for active companies

Kaspersky Small Office Security has been specifically designed for small businesses that want to focus on increasing revenue without having to worry about their IT security, thanks to an affordable and reliable protection solution. Kaspersky Small Office Security combines the simplicity of a personal protection solution with features designed to protect your business while your employees do their work.

It’s not just Halloween when the spooks show up…

Cyberthreats occur all year round and in all seasons – rain, wind or shine. Check out this infographic from Kaspersky that breaks the threats down all year round!

 

Want to find out more?

As Kaspersky Platinum Partners, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

Cybersecurity in the workplace – educate & protect your users

Employees are of course your company’s most valuable asset, and grow revenue, build relationships with clients, and, make the business function. They also have an invaluable role to play in the firm’s security perimeter.

Cybercriminals, however, are more likely to view your employees as the path of least resistance into an organisation. Indeed, two of the top causes of security breaches are careless or uninformed employee actions and phishing or other social engineering. Cybercriminals know that, and they use it to their advantage.

With a robust security education programme in place, your company can protect its most sensitive information by ensuring cybercriminals cannot break through your employee firewall.

With a lot of customers and prospects asking about cybersecurity best practices for their workplaces, here’s a summary of some of the main ones.

What type of cybersecurity awareness programme would be best for our business?

Cybersecurity awareness programmes are not one-size-fits-all. Every organisation will have different needs depending on their business strategic goals, objectives, risk analysis, and even risk appetite. So, it’s useful to ask how cybersecurity helps the primary business of the organisation, and if it meets your particular requirements.

From a cybersecurity perspective, what should we think about when securing our workplace?

Organisations often overlook three areas when thinking about cybersecurity:

  1. The role of IoT: The well-being of employees should be at the forefront of every organisation’s plans for cybersecurity. This may not seem intuitive when thinking about cybersecurity, or very cyber to most. But the increasing prevalence of Internet of Things (IoT) devices has blurred the line between physical security and cybersecurity. Wireless security cameras that are managed through a Web interface or a smart lock that is opened by an employee’s smart phone — when do things stop being physical and start being cyber? Many companies have traditional physical security and environmental controls in place, but these groups are disconnected from the real problem solvers. In an IoT age, cybersecurity and IT teams are responsible for remediation efforts. In the workplace, these systems often share the same network resources as the rest of the business. Connecting IoT devices to the main network is risky because it provides an entry point for potential attackers to access corporate network resources. Vulnerable systems can also be used to access poorly secured industrial control systems (ICS). For organisations that run critical infrastructure or manufacturing on ICS, an in-depth search of all systems involved should be performed. These networks should also be included in any cybersecurity efforts going forward.
  2. Situational awareness of assets and data. Most cybersecurity frameworks rest on knowing what assets (including data) an organisation has: the systems and applications that process the data, who has access, and where it resides. A cybersecurity risk assessment based on known assets will allow for a more thorough way to determine viable threats. This enables an organisation to focus its cybersecurity resources where they matter most.
  3. Cybersecurity awareness and training: Awareness extends beyond discovering and cataloging assets. Awareness should be a continual effort to educate employees on policies, current threats, and how to deal with those threats. Special focus should be paid to social engineering, which is still the most common and successful attack vector. Organisations should offer training geared toward certain roles, not just generic awareness training. Make the training personal and fun. Tell stories and play educational games that will support awareness concepts. An awareness program should be anything but a test. A good cyber programme features a mixture of in-person/instructor-led, online/self-paced modules, scenario-based, and surveys. Always gather metrics to show successes and weaknesses in security awareness programs.

Our IT team is already well informed about cybersecurity. Why should they undergo more training?

Regular education on cybersecurity hygiene should be common practice across the organisation. Employees are often referred to as the “weakest link,” but in actuality, they are the most common attack vector and should be treated like any other attack vector in the organisation.

We have run a few training programmes already, but none seem to be effective. What should we be doing?

It’s no secret that traditional training programs typically fail to achieve the desired behavioural changes or motivation. To build an effective educational programme, there has to be an understanding of what lies behind any learning and teaching process. For a successful cybersecurity awareness program, the key is to create a culture of cybersecurity — one that motivates employees to continue secure practices in their daily lives beyond the perimeters of the office. After all, the goal of awareness training is not only to deliver knowledge but to change habits and form new behaviour patterns.

The  Kaspersky Security Awareness products are a good place to start or to fill in gaps in an existing programme. The computer-based training products draw on modern learning techniques: Gamification, learning-by-doing, and repeated reinforcement help to build strong skills retention and prevent obliteration; and emulating the employee’s workplace and behaviour draws users’ attention to their practical interests. These motivating factors guarantee that the skills will be applied.

How often should employees be reporting suspicious activity?

Cybersecurity teams would rather have employees report a false positive than wait until something “suspicious” manifests into a large threat. But before employees can report suspicious activity, they need to be able to identify what is considered suspicious.

A robust cybersecurity awareness training programme and its reinforcement materials should define suspicious incidents through examples, and how and when to make a report. Employees should then be encouraged to report any activity that may seem suspicious. Different procedures exist for incident reporting. Some organisations use the IT service desk, others have an email that generates a ticket for the security teams, and some may require employees to report the incident to their managers.

Once employees are knowledgeable in identifying and reporting suspicious activity, the next step is to establish incident response policies. Incident response policies should outline procedures and employee responsibility when dealing with an incident.

The message to emphasise is that it’s easier to nip something in the bud even if you’re not sure if it’s a cyber threat than to manage a crisis in full bloom.

How does BYOD impact cyber security policies?

Bring your own device (BYOD) has become an increasingly popular approach in UK business. Employees get to enjoy the flexibility of choosing when to work and what device to work on, and employers benefit from reduced support costs for IT assets.

However, a poorly managed BYOD policy can put company data at great risk. Allowing employees to use their own devices for work means their devices are “out of view” of traditional security controls.

And while not all businesses need end-to-end BYOD policies, it is crucial that they establish safety policies and procedures. For example, they need to segregate work and play. Company data should be processed only by applications that are vetted and secured by the organisation. This may seem challenging when users are on their own devices. Thankfully, mobile device management (MDM) tools exist. MDMs can segregate and secure company data, vet and approve applications, and track and remotely wipe devices of all company-related information.

Where can I find more resources for continued education on cyber security?

Kaspersky Lab offers various resources for maintaining ongoing awareness of threats and incidents in the world of cybersecurity. You can read about some of these, or contact Complete IT Systems using the details below to discuss your requirements and for more advice about the solutions on offer.

  • Threatpost is a leading source of information for news about IT, business security, and cybersecurity analysis.
  • Securelist provides news, reports, and fascinating research in the cybersecurity industry.
  • The Kaspersky Lab threats site is constantly updated with the ever-changing landscape of threats and vulnerabilities in cybersecurity.
  • The Cyberthreat real-time map is an interactive tool that visualizes real-time cyberthreats around the world.
  • And, of course, Kaspersky Daily, our main blog, has posts relevant for businesses and consumers.

Want to find out more?

As Kaspersky Platinum Partners, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

The perfect solution for Windows 10 migrations

Kingston’s Desktop/Notebook Memory and Business Solid-State Drives (SSD) are the perfect enterprise client combination for your Windows 10 migration and system update deployments.

The UV500 family of solid-state drives dramatically improves the responsiveness of your existing system with incredible boot, loading and transfer times compared to mechanical hard drives. Powered by a Marvell 88SS1074 controller combined with 3D NAND Flash for read and write speeds up to 520MB/s and 500MB/s1, this SSD is 10X faster than a traditional hard drive for better performance, ultra-responsive multi-tasking and an overall faster system. UV500 provides end-to-end data protection, supports 256-bit AES hardware-based encryption and TCG Opal 2.0 security management solutions.

More reliable and durable than a hard drive, UV500 is built with NAND Flash semiconductor memory. There are no moving parts, making it far less likely to fail than a mechanical hard drive. It is also cooler and quieter, and its shock and vibration resistance makes it ideal for notebooks and other mobile computing devices.

UV500 is available in Multiple capacities from 120GB–1.92TB,2 so you can buy one to use as a boot drive, or take advantage of the larger capacities to store videos, photos and host your most frequently used applications.

Ideal for desktops and notebooks

Comes in multiple form factors (2.5”/M.2/mSATA) to fit in a wider array of systems. It is ideal for slimmer notebooks and systems with limited space.

Multiple capacities

Available in a range of capacities up to 1.92TB2 to meet your data storage requirements.

Encrypted protection

Protect sensitive data with support for 256-bit AES hardware-based encryption and TCG Opal 2.0.

10X faster than a hard drive

With incredible read/write speeds, the UV500 will not only increase performance, but can also breathe new life into older systems.

How we can help

Complete IT Systems and Kingston Technology have the solutions, experience, accreditations and skills to provide your business with the security solutions you need. For more information call us on 01274 396 213 or contact us and we can call you back.

Hardware vs software encryption for encrypted USB flash drives…

USB drives have proven their value for companies of all sizes, in many important ways. They have delivered tangible benefits as file sharing and mobility tools, as backup drives and much more. We are often asked about the differences between hardware-based and software-based encryption used to secure a USB drive, so in this blog we discuss just that.

Due to the ease and mobility of today’s USB drives, sensitive and valuable data stored within the USB drive can be easily lost or stolen. To combat the disadvantages of using standard consumer USB drives for storing and moving business data, Kingston introduced a range of secure USB drives designed specifically for corporate use. These secure, encrypting USB drives have helped businesses large and small transport their mobile data securely and confidently. Encryption of the USB drives can be performed two different ways, on either the hardware or software.

Hardware-Based Encryption

  • Uses a dedicated processor physically located on the encrypted drive
  • Processor contains a random number generator to generate an encryption key, which the user’s password will unlock
  • Increased performance by off-loading encryption from the host system
  • Safeguard keys and critical security parameters within crypto-hardware
  • Authentication takes place on the hardware
  • Cost-effective in medium and larger application environments, easily scalable
  • Encryption is tied to a specific device, so encryption is “always on”
  • Does not require any type of driver installation or software installation on the host PC
  • Protects against the most common attacks, such as cold boot attacks, malicious code and brute force attacks

Software-Based Encryption

  • Shares computers resources to encrypt data with other programs on the computer – Only as safe as your computer
  • Uses the user’s password as the encryption key that scrambles data
  • Can require software updates
  • Susceptible to brute force attacks, computer tries to limit the number of decryption attempts but hackers can access the computer’s memory and reset the attempt counter
  • Cost-effective in small application environments
  • Can be implemented on all types of media

How we can help

Complete IT Systems and Kingston Technology have the solutions, experience, accreditations and skills to provide your business with the security solutions you need. For more information call us on 01274 396 213 or contact us and we can call you back.

Why you can trust your business data with encrypted USBs

In recent weeks we’ve been discussing the benefits of using encrypted USB to safeguard your business data. But what is it about encrypted USBs that makes them stand out above other data security solutions? Here we lift the lid on how Kingston’s IronKey D300 USB Flash drive features an advanced level of security that safeguards your sensitive company information.

Firstly, it’s FIPS 140-2 Level 3 certified, with 256-bit AES hardware-based encryption in XTS mode. An essential pillar to setting security standards, corporate policies and data loss protection (DLP) best practices – an important element in the quest for compliance with industry standards and global regulations such as the GDPR.

How about BadUSB?

For added peace of mind, the drive uses digitally signed firmware, making it immune to BadUSB, and enforces complex password protection with minimum characteristics to prevent unauthorised access.

Encryption and decryption is done on the drive, with no trace left on the host system, and the drive locks down and reformats after 10 invalid attempts to protect against brute force attacks.

Rugged and secure, the IronKey D300 has a zinc casing and tamper-evident epoxy seal for physical security, so you can rest assured the drive will hold up, even in the most demanding situations and environments. It’s customisable, easy to use and waterproof up to 4 feet, conforming to IEC60529 IXP8**. SuperSpeed (USB 3.0) technology means you don’t have to compromise on speed over security.

Serialised (S) models

The IronKey D300S / D300SM brings two additional features on top of its industry-leading data protection.

Unique serial-number and barcode printed on drive;

  • Allows network administrators simply to read or scan the code instead of plugging in a drive to learn its unique serial number.
  • Time saver both when the drive is deployed and when it is returned, as well as during any physical auditing of hardware done by a company. If a lost drive is found, the owner can quickly be tracked by the serial number.

Virtual keyboard

Enables users to enter a password via mouse clicks, instead of using a physical keyboard; to reduce the risk of a keylogger intercepting the password being keyed in.

Protection when using your encrypted drive on other computers that may be logging every keystroke made on a physical keyboard, including passwords.

Managed model

IronKey D300M / D300SM is available in a Managed model that requires IronKey EMS, with the D300SM also supporting SafeConsole by DataLocker***. This allows central management of drive access and usage across thousands of drives.

Either cloud-based or on-premises, it enforces drive-specific policies, such as password strength and retry limits, and lets administrators remotely disable lost or stolen drives, recover lost passwords and more.

  • Advanced level of security that builds on the features that made IronKey well-respected
  • Available in a Managed model that requires IronKey EMS by DataLocker***
  • Rugged and secure casing that meets IronKey standards
  • Fast data transfers that use the latest in NAND Flash and controller technology
  • Customisable
  • Easy to use

See more

Watch this short video for an introduction to the IronKey D300M.

How we can help

Complete IT Systems and Kingston Technology have the solutions, experience, accreditations and skills to provide your business with the security solutions you need. For more information call us on 01274 396 213 or contact us and we can call you back.

USB drives – 4 steps to reducing the business risk

USB drives are the tried and trusted faithful companion in professional life. They were around long before cloud-based file storage, sync and share platforms, they don’t rely on WiFi connections, and they are just an easy way of getting data from A-to-B. What’s not to love?

There’s a ‘but’…

It shouldn’t be news by now, but they come with substantial risks of a data leak. Here’s the risks by numbers:

  • USB drives have been lost in 49% of companies
  • Employees save sensitive data on USBs in 24% of companies
  • 91% of USB drives used for this data are unencrypted

That’s not a good situation at any time, lest of all in the age of data privacy and regulations such as GDPR – we discuss more in our blog here.

How can I shore up my company’s data?

There’s 4 simple steps you can take to ensuring no sensitive data (or any data for that matter) with company financial information, customer details or sales pipeline, confidential employee data, product roadmaps and so on are secure.

  1. Create awareness of the problem among your users (share the infographic below)
  2. Educate and train your users
  3. Set and implement policies
  4. Use hardware-based encrypted USB drives, and/or an appropriate enterprise-grade cloud file sync and share platform

Click on the image below to see the full infographic

How we can help

Complete IT Systems and Kingston Technology have the solutions, experience, accreditations and skills to provide your business with the security solutions you need. For more information call us on 01274 396 213 or contact us and we can call you back.