This checklist helps organisations prepare for both Cyber Essentials (self-assessment) and Cyber Essentials Plus (independently audited). Follow each section to ensure you meet the baseline requirements before certification. 1. Scope & Asset Identification Define your certification scope Create an asset inventory 2. Secure Configuration Device hardening Password & authentication standards 3. Patch Management / Security […]
Category: Blog
Hackers Are Impersonating IT Support on Microsoft Teams — What Your Business Needs to Know in 2025
Cybercriminals are becoming increasingly bold — and their latest tactic is catching many businesses off-guard. Recent reports have revealed that hackers are now posing as IT support staff on Microsoft Teams, tricking employees into approving malicious access requests or installing harmful software. For small and medium businesses, especially those relying heavily on Teams for day-to-day […]
AI Tools That Help Small Businesses Work Smarter, Not Harder
Artificial Intelligence (AI) is no longer just for tech giants. Today, small businesses are tapping into powerful AI tools to save time, cut costs, and improve decision-making—without needing an in-house tech team. From automating the mundane to sharpening customer insights, AI is reshaping how small enterprises compete and thrive. Here’s a look at some of […]
Ransomware Exposed: What it is and How it Works
Ransomware has become an undeniable threat to business growth, profitability and security. It’s a ruthless type of malware that locks your keyboard or computer to prevent you from accessing your data until you pay the ransom, which is usually demanded in untraceable Bitcoin. Cyber criminals are turning this type of attack into big business, raking […]
Security Patches – The Better Way to Update
Updates often come at the worst moment. You go to shut down your laptop to rush to a meeting, and you get a “Windows is updating. Do not power off” message. Argh! Or you leave your desktop to go to a meeting and come back to find your computer has restarted in your absence. Those […]
Think Before Sharing That Link
Learning to share is an important early-life skill. Now, you’ve mastered it, and you’re out in the workforce. Happily, digital technology makes it much easier to share business files, but that doesn’t mean you want to do so willy-nilly. Consider these best practices for sharing with both internal and external users. Cloud sharing makes it […]
What to Do If Your Data Is Included in a Leak
Data breaches are now daily occurrences and can happen to any business. The April 2021 leak of 533 million Facebook records was one of the largest known data leaks, but even if you weren’t affected by that one, you may still be at risk. There is no easy way to know if your information has […]
Small Businesses Can’t Sacrifice Cybersecurity
For small businesses, it can be tempting to postpone cybersecurity efforts. There are many common excuses: “There’s so much to do,” “There’s not enough budget,” “Our business is too small to target,” etc. But right now, cybersecurity is a must-have for every business. Think of it like business insurance. You don’t intend to get sued […]
What an MSP Does and Doesn’t Do
Managed service providers (MSPs) pride themselves on high levels of support. Yet, there are some things we can do and others we can’t. Laundry and grocery shopping come to mind for the latter. But, more seriously, this article will explain what an MSP does and doesn’t do. Your business faces many challenges today. You’re managing […]
Is the Cloud Right for Your Business?
Cloud services have been shaking up the industry for years now, and its adoption by small and mid-sized businesses is driving cloud computing’s growth. Yet while there are many benefits to migrating to the cloud, it isn’t the solution for every situation. This article will explore some reasons why your business may not suit the […]
Secure Your Remote Work with the Right Backups
Working from home is no longer only for a few employees in special circumstances. The pandemic pushed many businesses to enable remote work. The priority was getting it working and securing access. Now that it’s routine, it’s also time to consider how you back up work from home. Data backup creates a reliable copy of […]
4 Important Reasons to Use Anti-Spam Filtering in your Business
Remember when spam was obvious, and unless you desperately needed a special blue pill, it was easy to identify and ignore? Those were the days! The impact on your business would have been minimal, as spam was more an annoyance than anything else. Unfortunately, spam has matured into an aggressive threat, marked by sophisticated attacks […]
