Search for anything.

Your search for: "" revealed the following:

Search...

Consider IT
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us

Consider IT
0131 510 0110Contact Us For A Free Quote
[email protected]Consider IT Limited, Waterview House, Edinburgh, EH6 6QU
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us
Consider IT
Consider IT
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us

Your search for: "" revealed the following:

Search...

2010

Home2010
Recent Posts
  • Cyber Risks for Charities: How to Safeguard Your Organisation
    Oct 24 2024
  • Upcoming Cyber Essentials Changes in April 2025
    Sep 27 2024
  • Consider IT is now a certified B Corp Text on Blue and Orange background
    Celebrating a New Milestone: Consider IT Becomes a Certified B-Corp
    Jun 04 2024
  • Consider IT blog title: Over 19000 sensitive documents stolen in Volkswagen breach overlayed on orange and blue gradient background
    Volkswagen Group has over 19,000 sensitive documents stolen in Cyber Attack
    Apr 24 2024
  • Blog Title 7 strategies to combat malware and ransomware on a blue and orange gradient background
    Staying Ahead of the Game: 7 Strategies to Combat Malware and Ransomware
    Apr 19 2024
  • Blog title The cost of a cyber attack on a blue and orange gradient background
    Counting the Costs: Understanding the Financial Impact of Cyber Attacks on Businesses
    Mar 19 2024
  • Blog title The Importance of Cyber Security Awareness training on a blue and orange gradient background
    The Importance of Cyber Security Awareness Training
    Feb 28 2024
  • Blog title Why choosing and independent IT support provider trumps big corporations on a blue and orange gradient background
    The Personal Touch: Why Choosing a Local, Independently Owned IT Support Provider Trumps Big Corporations
    Jan 10 2024

Protect Yourself During the Holidays

Protect Yourself During the Holidays

Christmas is the biggest selling season of the year for retailers no matter where you are located. This no longer only applies to brick and mortar shops, but extends to the online world of shopping as well. Something that all shoppers need to keep in mind in their search for the perfect gift is to keep their personal information safe from harm. One way for web surfers to do this is by looking for the Padlock on the website. This ensures that the information they are providing is being given to a retailer with a SSL Certificate. Many companies use IT support Edinburgh has to offer to supply this.

Knowing who you are purchasing from is another way to be sure you are shopping safe online during the holiday season. Contacting the retailer prior to making the purchase is a terrific way to make sure the company is for real and truly in business. You should have no problem finding contact information on the website. Even if you find contact information that says IT Support Edinburgh you should be able to contact a person. Additionally, you will want to be able to find an actual postal address for the company.

When making purchases online you can safeguard your personal information by using credit cards with your purchase and not your debit card. This will limit the personal information that the retailer has access to. Even if they have the best IT support Edinburgh has to offer they will not be able to access your bank account if you are using your credit card. Even if you are located in Edinburgh Castle itself, they will not be able to access your personal information. They will be limited to your credit card information which is typically safe guarded by the credit card companies.

Choosing to shop online for the holidays is something that many people are doing now. This means that there are a many needs from the IT support Edinburgh professionals can supply the many websites based in Scotland. They are able to supply retailers with safe venues for customers to shop on. This is of great comfort to many retailers who want to supply excellent product and services to their customers. Using caution when shopping online even during the rush of the holidays will ensure that you are not giving away important personal information that could damage your finances for years to come.

stuart.gilbertson
December 22, 2010
0
Share:

Business IT Support Edinburgh – Encryption is Vital

One thing that any of the companies for business IT support Edinburgh can offer will tell you is that it is important that you safeguard your work. This includes encryption of your important data and company information. This is the only way that you can be sure that the information your company holds dear will be safely tucked away. Keeping the information safe from prying eyes is the only way to ensure that your personal and financial information is held safely. It also will ensure that your competition does not get their hands on any information that can be damaging to your business.

Choosing the right company to represent your IT needs can be a challenge. Knowing what you need is the key to getting the right services. There are many questions to ask when looking for business IT support in Edinburgh. Taking some time to really assess your needs before starting the search will help you find exactly what you are looking for and will assist you in making the right decision in a timely manner. Take inventory of where your business is today in its computer needs and where you hope it will be in the near and use this information to discuss your needs with your potential IT help.

Good business IT support Edinburgh offer will understand fully the value of encryption in your files and will help you to perfect this task to keep your information as safe as possible. There are a number of options available in computer security and making the right choice can be a little overwhelming. An IT professional can help you to assess your current situation and see what your safety risks are for your computer systems. From this point your IT professional can help you to assess any potential future threats that may become an issue.

Taking time to talk with a business IT support in Edinburgh, whether you are based in Midlothian or in one of the Edinburgh villages, will open new doors for your computing world. You will be able to assess any potential dangers and keep from falling into any dangerous pits that may damage your business. IT help can be hired on a contract basis or on an adhoc basis depending on what your specific needs are and how often you feel you would like services from the IT personnel. Taking stock of your company needs and reviewing this information with your IT professional will help you to make these decisions.

stuart.gilbertson
December 22, 2010
0
Share:

Consider IT wins Grant Stott’s Big Daft Pub Quiz 2010

Consider IT along with fellow friends, won the Forth One “Grant Stott’s Big Daft Pub Quiz”!

Leading at the start, and then looking as though all was lost, we eventually came in with an astounding 129 points to take the winners trophy!

Pictures of the fantastic night out are on our Facebook page: Consider IT Limited Facebook and on Forth One’s Gallery

We also filmed Grant announcing the winners, and we were as surprised as everyone else: DENSA win Grant Stott’s Pub Quiz!

stuart.gilbertson
November 12, 2010
0
Share:

Yorkshire Building Society loses customers’ details on unencrypted laptop

The Information Commissioner’s Office (ICO) has found Yorkshire Building Society (YBS) in breach of the Data Protection Act after an unencrypted laptop belonging to the former Chelsea Building Society (CBS), which had recently merged with YBS, was stolen from its Cheltenham premises. The laptop contained a substantial part of the CBS customer database.

The laptop was recovered within 48 hours after YBS appointed private investigators, and forensic investigations revealed that none of the data had been accessed during that time, although there had been several attempts to do so.

It was later discovered that the manager had written down the passwords to the computer and left these in a bag with the laptop under a desk overnight.

Mick Gorrill, Head of Enforcement at the ICO, said: “It is extremely concerning that an unencrypted laptop containing large amounts of personal data was left unsecured overnight, together with details of its passwords. What’s more, the fact that the employee did not require all the information to carry out the task in hand created an unnecessary risk which could easily have been avoided; employees should only have access to information that is absolutely vital to work which is being carried out.”

Iain Cornish, Chief Executive of Yorkshire Building Society has agreed to take a series of remedial steps to ensure that such a data security breach does not happen again. This will include ensuring that all portable devices including laptops are encrypted (a measure that is already in place at1YBS), that all staff are made aware of the company’s policies for the storage and use of personal data and that staff will only have access to the type and amount of personal data that is necessary for their work.

For more information about getting your business secure and laptops encrypted, see our Business Encryption Services page.

stuart.gilbertson
September 5, 2010
0
Share:

Conmen steal control of computers

A new scam which sees fraudsters calling your home landline and taking control of your home PC is surfacing in Edinburgh.

The conmen, who are thought to be calling hundreds of Edinburgh based PC users, are claiming to work for Microsoft and are warning the PC users that they have an infected computer. They then convince the unsuspecting user to click on a web link directing them to malware which allows the caller access to the remote PC.  This allows them to copy bank details, passwords, and other sensitive data off the computer.

A spokeswoman for Lothian and Borders Police said: “Our advice to avoid falling victim to fraud would be to never engage with someone who cold calls out of the blue and give them access to your computer. If you have concerns about your computer security, ask a known and trusted expert to assist.”

The Edinburgh Evening News Reports: http://edinburghnews.scotsman.com/news/Conmen-take-control-of-home.6488963.jp

stuart.gilbertson
August 23, 2010
0
Share:

Virgin Media customers about to receive warnings

Virgin Media, the UK’s third-largest Internet Service Provider will match lists of compromised IP addresses collected by the Shadowserver Foundation against its customer lists so that they are able to issue a letter of warning about their security.

Subscribers to Virgin Media whose computers are part of a botnet can expect the warning letter telling them to tighten up their security immediately. Those with infected machines will be asked to download free security software to remove the malware and protect their computers and connection.

Virgin Media said it expects to send out hundreds of these letter per week initially, and has plans to expand their campaign based on customer feedback. Virgin Media will also take the opportunity to try and sell its Digital Home Support service offering remote PC maintenance over the phone.

stuart.gilbertson
August 17, 2010
0
Share:

Ofcom allows consumers to terminate broadband if it’s too slow

Consumers can leave their broadband providers with no penalty if internet access speeds are too slow, under new plans drawn up by telecoms regulator Ofcom. Ofcom has also urged advertising regulators to develop a new measurement, ‘typical speed range’, on which fair comparisons can be made. Research just published by Ofcom shows that the gap between the advertised speeds of broadband access and the actual speeds experienced by internet service provider (ISP) customers is growing.

A new code of practice on broadband speeds will give customers the right to leave their ISP without paying any contract penalties in the first three months of their subscription if their actual download speeds are far below the advertised speeds.

The new code of practice on broadband speed is voluntary and only applies to those companies which sign up to it, but Ofcom said that the country’s biggest ISPs – BT, Talk Talk and Virgin – have all indicated that they would sign up to it.

The new Ofcom code of practice can be viewed at: http://stakeholders.ofcom.org.uk/telecoms/codes-of-practice/broadband-speeds-cop-2010/code-of-practice/

Ofcom’s research shows that almost one quarter of all broadband subscribers say they receive slower speeds than expected. Slow speeds are the most common complaint to ISPs (27% of all complaints)

stuart.gilbertson
July 29, 2010
0
Share:

A quarter of all data breaches are from the NHS.

The Information Commissioner’s Office (ICO) remains highly concerned that data breaches involving people’s personal information are continuing to occur in NHS organisations.

Today NHS Stoke-on-Trent and Basingstoke and North Hampshire NHS Foundation Trust are the latest NHS bodies found to have breached the Data Protection Act (DPA). Both NHS organisations’ chief executives have signed formal Undertakings outlining that they will process personal information in line with the DPA.

Mick Gorrill, Head of Enforcement at the ICO, said: “Everyone makes mistakes, but regrettably there are far too many within the NHS…”

The NHS organisations have agreed to implement a number of security measures to protect personal information more effectively. All staff will be made aware of the organisations’ policies for the retention and use of personal data and will receive training on how to follow those policies.

NHS Stoke-on-Trent will also apply physical security measures in respect of paper medical records, particularly when they are in transit. The ICO can issue a monetary penalty for serious breaches of the Data Protection Act.

If your business handles personal or confidential information that should really be encrypted in transit, give Consider IT a call now on 0131 510 0110

stuart.gilbertson
June 16, 2010
0
Share:

Lampeter Medical Practice loses unencrypted memory stick

The Information Commissioner’s Office (ICO) has found Lampeter Medical Practice to be in breach of the Data Protection Act, after an unencrypted memory stick containing the personal details of 8,000 patients was reported lost to the privacy watchdog.

In March 2010, a member of staff downloaded a database containing patient details in contravention of practice policy. The staff member downloaded the information on to an unencrypted and non password protected computer memory stick which was then posted by recorded delivery to the Health Boards Business Service Centre. The memory stick did not arrive at its intended destination and is now accepted to be lost.

Sally-anne Poole, Enforcement Group Manager, said: “It is unnecessarily risky to download 8,000 personal details on to a memory stick. It is imperative that staff are made fully aware of an organisation’s policy for securing personal data and any portable device containing personal information should always be encrypted to prevent it being accessed in the event of loss or theft…”

If your business is at risk of this happening, give us a call and let’s get your data sorted!

stuart.gilbertson
June 4, 2010
0
Share:

West Berkshire Council has lost an unencrypted memory stick

West Berkshire Council is taking remedial action after the Information Commissioner’s Office (ICO) found it in breach of the Data Protection Act (DPA) following the loss of a USB stick containing the sensitive personal information of children and young people.

The details, said to be of ‘a handful’ of children, would be available to anyone finding the memory stick, which was unencrypted and not password protected.

The ICO found that unencrypted devices, in operation before the council introduced encrypted memory sticks in 2006, were still being used by members of staff. Further enquiries revealed staff had not received appropriate training in data protection issues and monitoring of compliance with the council’s policies was found to be inadequate. This is the second data security incident reported by West Berkshire Council within six months.

Nick Carter, Chief Executive of West Berkshire Council, has now signed a formal Undertaking to ensure that portable and mobile devices used to store and transmit personal data are encrypted.

Sally-anne Poole, Enforcement Group Manager at the ICO, said: “It is essential that organisations ensure the correct safeguards are in place when storing and transferring personal information, especially when it concerns sensitive information relating to children. A lack of awareness and training in data protection requirements can lead to personal information falling into the wrong hands. I am aware that staff have been provided with encrypted USB sticks since 2006 but older devices were not recalled…”

stuart.gilbertson
June 3, 2010
0
Share:
1 2 3
CONSIDER IT FACEBOOK CONSIDER IT Twitter CONSIDER IT Linkedin

Contact Us

0131 510 0110
[email protected]
Find Us

Customer Service

Contact Us
Our Locations
Case Studies

Information

About Consider IT
Domains
Privacy Policy
Terms & Conditions
Press Enquiries

© 2025 Consider IT Limited – All Rights Reserved
Registered office: Waterview House, 37 Shore, Edinburgh, EH6 6QU. Company Number: SC320341 | VAT number: GB 930 1862 42
Consider IT is a trading name of Consider IT Limited