All posts tagged IT Support

Guide to Becoming PCI DSS Compliant

PCI DSS (Payment Card Industry Data Security Standards) have been created by an official Global Forum Council to offer comprehensive “standards and supporting materials to enhance payment card data security” to companies throughout the World. The Council was founded by five Global payment organisations- American Express, JCB International, Discover Financial Services, Visa Inc and MasterCard in an effort to unite and produce a globally accepted standard for all PCI DSS matters. Unfortunately, many organisations have been cited saying the PCI DSS rules and regulations are not clear enough. This results in companies believing they are compliant when in fact they are…

Top

Maximise your iPhone

Try these five tips to maximise your iPhone productivity… Use Bookmarks Set your most frequently visited sites as bookmarks in Safari, when you open a new tab you can select one of your favourites from the grid to save you time searching or typing lengthy URLs. Have an admin day Do some filing! The folder options in iOS are a great way of staying organised and enabling easy access to multiple apps. Rather than scrolling through pages to find the right app you can find all your apps on one single page, saving you time. Optimise Spotlight The spotlight search…

Top

Android Flaw Reveals Locations

A flaw has been discovered in the Android operating system that could reveal information on your current and past locations. The vulnerability, found in Android Honeycomb 3.1 onwards can be exploited to share the wifi networks you’ve been previously connected to, to any other wifi enabled device within the range of your phone or tablet. For example, you arrive at work and connect to the office wifi on your smartphone to check your emails, at lunch you log into a local café’s free wifi network to do a bit of lunchtime browsing and on your way home you connect to…

Top

You could test the latest beta Microsoft Office!

Microsoft is giving everyday home and professional users of Office a chance to experience the newest versions of the software for free before their official release date, in exchange for constructive criticism. The pre released beta versions of Access, Excel, OneNote, Outlook, PowerPoint, Publisher, Vision and Word will be available to users in their purest non-tested form, in return users must provide developers at Microsoft with feedback on the new version software. Business users will also be offered the opportunity to test premium business products such as Exchange, Project and SharePoint as well as online cloud services. In order to…

Top

DDoS attacks causing concern in for UK

A global study on disruptive cyber attacks carried out by BT has identified Distributed Denial of Service (DDoS) attacks are a growing concern for UK organisations. A previous survey revealed over half of UK organisations that took part said their systems had been down for more than 6 hours in the past 12 months and over three quarters of them reported being attacked more than once. However when examining the attitude and response to the DDoS attacks it highlighted that only about half of the UK organisations have a response plan in place and less than 1 in 10 UK decision…

Top

Apple Exchange Faulty iPhone Chargers

Apple have released a safety risk notice on USB iPhone chargers sold in Europe between 2009 and 2012 following evidence that they may overheat and pose a risk to health. The A1300 charger adapter for iPhone 3G, 4 and 4S was shipped as a boxed product alongside phone units as well as a separate accessory between October 2009 and September 2012. The chargers were sold across Europe and South Africa as well as in certain Asian countries including India, Indonesia and Vietnam. The charger however was not sold in the UK. The potential malfunction is said to occur rarely and…

Top

Proactive Prevention of Web Security Risks

Protecting your websites and networks from intrusions, bugs and breaches is a top priority for all businesses and we all employ tools and resources to help up stay best protected. Despite investing time and money into these resources, many are often not used to their full extent and despite having measures in place, if not used properly the risks can remain a threat. So how can you proactively prevent web security risks and utilise the tools and resources to the best of their ability in a demanding business environment? Be aware of where your personal data is stored Knowing where…

Top

Apple Expands Trade In Scheme to iPads

Apple has offered online iPhone trade ins as part of their ‘Reuse and Recycle’ programme for the last few years. The service until recently has been limited to online customers only, however Apple recently expanded this service to its in-store customers. The service allows iPhone users to walk into a high street Apple Store and trade in their old iPhone in return for discount on a newer model. The service until now has been limited to the iPhone only, however Apple have now announced they have expanded this service to cover iPads too. From today Apple customers can walk into…

Top

Keeping Windows XP Secure

Today marks an end of an era for Windows XP, the 12 year old operating system that has dominated the last decade is being laid to rest by Microsoft, no longer offering support or updates despite many computers still relying on the outdated operating system. So what do you do if you’re still using XP? The best option is to upgrade, after all Windows have given users a year’s warning, but if upgrading to Windows 7 or 8 hasn’t been possible then there are other steps you can take to protect your systems… Firstly, ensure your computer is fully up…

Top

The importance of end to end encryption for all communications

In recent news Ed Snowden has called for “enterprises to make more use of end to end encryption to protect data from being intercepted”. Signal Networks understands secure communications between enterprise networks, businesses and partners, and corporations and mobile workers is now more important than ever.  Signal Networks will always ensure your data is protected and recommends end to end encryption as standard practice. When using a VPN your connection is vulnerable to being intercepted by hackers.  Using SSL, a protocol for transmitting private documents via the Internet, and heavily encrypted ISPec tunnels, which authenticates and encrypts each IP packet…

Top
1 2 3 Page 1 of 3

Call us 0333 370 2202

Or email us: [email protected]