Over the past 7 days, we’ve seen a sharp increase in phishing attacks across multiple client environments. This isn’t just background noise — it’s a clear spike. And these aren’t the obvious, poorly written scam emails anymore. They’re sophisticated. Convincing. And designed to look exactly like the tools your business... read more →
Apr 29
Apr 27
Over the weekend, reports of an eBay outage sparked widespread frustration — and even claims of a potential DDoS cyberattack. While the outage itself was very real, the cause remains unconfirmed. A group has claimed responsibility, but without official verification, it highlights something more important than speculation: Is your business... read more →
Aug 19
Conduct regular training and awareness with your workforce to highlight the risks of social engineering and phishing. Specifically, have robust controls over new account requests or password resets and always know who you are talking to. Always operate strong authentication. Use a long, complex and unique password and Multi Factor... read more →
Apr 17
Microsoft have identified an exploit in iOS 18.4 They have released 18.4.1 which should be applied as soon as possible.
Mar 20
Having Cyber Essential Certification is a great start in helping to protect your network, emails and cloud data. By applying for the certification will put procedures in place to combat the cyber criminals. We are here to give advise and help obtain cyber certification.
Feb 26
Although Face ID activation to unlock you phone makes it easy, if your phone is snatched from you it is easy to get in to the phone by put the phone to your face and then changing all the setting. I suggest taking off Face ID for unlocking your phone.
Feb 24
With today's cyber criminals more prevalent where possible use MFA to secure your accounts. The microsoft authentication or google authetication apps are ideal for MFA. In Office 365 go to your account and security Info and setup MFA. Ensure that your google account has MFA also. If you are ubsure... read more →
Oct 06
Do you as a company invite your IT support company to your strategy meeting ?. If not why not. Having worked with may start up and successful business we at SRIT have always insisted that we are part of the strategy process. This is for two main reasons. 1. Ensuring... read more →
Sep 30
More and more scammers are using the telephone scam to take control of your PC/Laptop and empty your bank accounts. As telephone numbers can be spoofed you get a call from the number that you think is your bank/building society but it is actually not it is the scammer. My... read more →
Sep 05
Your LinkedIn business profile is another route to engage with followers, potential clients, expand your business in terms of career opportunities and generally market your company. LinkedIn is one of the only social media platforms which focuses on the people behind the brand more than the product itself. This is great for making... read more →