Interview with a Technology Revolutionist…!

Tell me about yourself Simon I’ve worked for nearly 30 years in IT. I am now the Managing Director of Riven Associates and head up the strategy –  client-side, and relationships. I guess I’m seen as the thought leader of the business. In your expert opinion, what are the number 1 priority businesses should be…

Read more

security

Public WIFI – a hackers delight!

Public WIFI security is a hackers delight! And we’ve all done it. How many times when you’re out and about have you connected to public Wifi? Free Wi-Fi is available everywhere now – in shopping centres, airports, restaurants, coffee shops, libraries, public transport, hotel rooms, the list is endless! These networks are used by millions…

Read more

security

IT Security – a Strategy not just a Sticking Plaster

From time to time, you may be requested to complete a form to demonstrate your company is serious about IT security. We are often asked to support clients with this – it’s very common for FCA regulated businesses. Whilst completing the form is pretty straightforward, it can feel like it’s a sticking plaster rather than…

Read more

security

Maximising Security for Empty Offices

When we went into lockdown for the first time back in March 2020, office security may have been quite low down your priority list. Once you had got to grips with remote technology, like most companies you were probably focused on getting as close to business as usual as possible. However, through the turbulent times…

Read more

IT Security

What is Multi Factor Authentication?

Multi Factor Authentication (MFA) is effectively an electronic or digital way of double checking you are who you say you are. As we have spent so much time in the last year logging on from different devices and in different locations, the chances are you will have already come across multi factor authentication. At the…

Read more

security

Taking the Bait

It seems 2020 has been a bumper year for cyber criminals with SMEs through to corporates falling foul to ransomware attacks including Carnival Cruises, Hackney Council, Garmin, Pitney Bowes and Honda. And it’s not just ransomware attacks, Twitter was hacked and criminals posted tweets from Bill Gates, Barrack Obama and Elon Musk. While the surge…

Read more

What is Shadow IT?

    Have you come across the term “Shadow IT” before and wondered what it is? Even if the answer to that is “No”, you definitely need to be aware of it and the implications for your business. So, what is Shadow IT? It is a relatively generic term, referring to equipment, applications or operations…

Read more

IT Security

Device Encryption – the why and the how

Do you protect the data available on your mobile phone and other devices, or is it just freely accessible to anybody that picks it up? We hope it’s the former, but sadly we have seen the latter all too often, and the consequences. If you don’t put in place some protection, everything about you is…

Read more

ransomware

Ransomware – Makes you WannaCry?

You’ve probably heard of ransomware and are wondering what all the fuss is about. If we told you that one of the most famous ransomware attacks was the WannaCry attack, which cost the NHS a reported £92 million, we think you’ll get just how serious it is. Travelex have been the latest high profile victim,…

Read more

security

Password managers – what should you do?

If you follow the password protocols we recommend for creating passwords, they are a complex combination of characters, which is excellent for security, but not so good when you need to recall them. While the obvious answer is to save your passwords in your browser, as they all offer password retention, their security is not…

Read more

IT Security

What makes a good password?

For all of us, the subject of passwords is a real pain. We have multiple accounts to access -email, various business apps, banking, and that’s apart from personal stuff like online shopping, film streaming services, and so on. So, how do you pick a password that’s difficult to crack? There are some basic rules in…

Read more

GDPR, IT Security

GDPR – How secure is your data?

As you will no doubt know, both from our previous blog post, and the numerous emails you’ve received about GDPR, data is everything. Regardless of the reason for you holding data, under the GDPR guidelines there is an increased need to demonstrate you are holding all of your data securely. And by that, we mean…

Read more

Get in touch with us

If you’d like to learn more about how we can support your IT systems, please get in touch …

01784 437 123

The White House, 53 High St, Egham TW20 9EX