Search for anything.

Your search for: "" revealed the following:

Search...

Consider IT
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us

Consider IT
0131 510 0110Contact Us For A Free Quote
[email protected]Consider IT Limited, Waterview House, Edinburgh, EH6 6QU
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us
Consider IT
Consider IT
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us

Your search for: "" revealed the following:

Search...

March, 2020

Home2020March
Recent Posts
  • Cyber Risks for Charities: How to Safeguard Your Organisation
    Oct 24 2024
  • Upcoming Cyber Essentials Changes in April 2025
    Sep 27 2024
  • Consider IT is now a certified B Corp Text on Blue and Orange background
    Celebrating a New Milestone: Consider IT Becomes a Certified B-Corp
    Jun 04 2024
  • Consider IT blog title: Over 19000 sensitive documents stolen in Volkswagen breach overlayed on orange and blue gradient background
    Volkswagen Group has over 19,000 sensitive documents stolen in Cyber Attack
    Apr 24 2024
  • Blog Title 7 strategies to combat malware and ransomware on a blue and orange gradient background
    Staying Ahead of the Game: 7 Strategies to Combat Malware and Ransomware
    Apr 19 2024
  • Blog title The cost of a cyber attack on a blue and orange gradient background
    Counting the Costs: Understanding the Financial Impact of Cyber Attacks on Businesses
    Mar 19 2024
  • Blog title The Importance of Cyber Security Awareness training on a blue and orange gradient background
    The Importance of Cyber Security Awareness Training
    Feb 28 2024
  • Blog title Why choosing and independent IT support provider trumps big corporations on a blue and orange gradient background
    The Personal Touch: Why Choosing a Local, Independently Owned IT Support Provider Trumps Big Corporations
    Jan 10 2024
March 18, 2020

Is your social media really safe?

If you’ve read our blog on CEO fraud, you’ll know that hackers are getting more and more sly when it comes to different ways to attack people and businesses.

Whether it’s through hacking IT systems, sending fake emails or carrying out malware attacks, there are so many different ways a hacker can actively get into your systems and find out sensitive information about you or your business.

But, did you know you might be giving hackers easy access to your private information through your own social media?

Have you heard of doxing? Doxing (or reconnaissance) is the way criminals research and gather information about a target before using it maliciously, whether its by hacking directly, guessing passwords, or even going so far as to create the perfect, personalised trap to target you.

Cyber criminals look to collect all of the information available about you, and social media can make you an easy target.

We willingly and freely publish so much personal information about themselves publicly on social media, from friends and family members to photographs, home and workplace addresses – all of which makes us more vulnerable to attack.

Passwords and password recovery answers often use seemingly innocuous details like children’s names, pet’s names, their year of birth, place of birth. But, when researched on social media and combined, these can be the perfect tools to unlock your email, social media and bank accounts.

Even more concerning, stats released by the National Cyber Security Centre last year showed millions of people in the UK used combinations of basic, easy-to-guess passwords including:

  • Passwords that include basic information that can be found easily from your social media – including your real name or username and family names, the football team you support.
  • Place names, birthdays, or single dictionary words.
  • Numerical or keyboard sequences (e.g. QWERTY, 12345)
  • Names of comic book characters and bands

These types of passwords are easy to guess and pose a threat the security of your accounts. Hackers will be able to easily guess these types of passwords by analysing your personal information and making informative guesses.

Make it more difficult for hackers by taking extra steps to minimise these threats.

There are simple, straightforward ways to make your social media more secure, including making social media profiles private and removing anyone you don’t personally know from your following. Enabling two-factor authentication with phone numbers and separate emails can also make your online presence more secure.

Other ways to secure your accounts include:

  • Regularly updating apps
  • Blocking unknown accounts
  • Making your passwords long, with combinations of upper- and lower-case letters, symbols and numbers
  • Be careful when logging into accounts through email links – always check the sender details because this is another popular phishing scam
  • Never share your passwords with anyone
  • Use different passwords for different social media accounts
  • Consider using a password manager

 

By making these simple changes, you can protect your own personal information from being analysed by potential hackers. By being aware of the dangers and taking some proactive, positive steps to reduce these risks can help keep your information from falling into the wrong hands.

These tips apply to your personal social media accounts, as well as your business and professional accounts. Want to talk to us about your business security? We offer a range of services including Cyber Essentials and Cyber Essentials Plus, backup services, a top-range Disaster Recovery Suite, and IT support.

 

You can find out more about all of our different services at https://considerit.com/what-we-do/managed-it-services/

David Lewis
March 18, 2020
0
Share:

Coronavirus Announcement: Business Continuity Plan

This page will be updated regularly as the situation changes.

Page Last Updated: Friday, 27/03/2020 at 8:15pm.

As you no doubt are aware, the current novel coronavirus (COVID-19) outbreak, which began in December 2019, presents a significant challenge for the entire world. In the event of the outbreak worsening, or a severe prolonged pandemic, the response will escalate. During this phase, the pressures on services and wider society may start to become significant and clearly noticeable.

It is almost inevitable that the UK Government will require businesses to force staff to work from home.

As part of Consider IT’s Disaster Recovery and Business Continuity plans, we are well prepared for allowing our own staff to work from home at very short notice.

Should we need to work from home, client site visits will, unfortunately, have to be cancelled or postponed. You will receive formal notification of us activating our Pandemic Business Continuity Plan, potentially with little notice.

Updates:

[16/03/2020 @ 09:30am]
We have now implemented the second stage of our Business Continuity Plan for pandemics. 50% of our workforce will now work from home until further notice. All site visits have now been postponed and we’ll be in touch regarding this on an individual basis. Site visits deemed critical will be decided on a case-by-case basis. Drop-offs of hardware etc. will be decided on a case by case basis.

[16/03/2020 @ 11:30am]
Please be aware that we are seeing unprecedented ticket volume, specifically clients looking to make changes to their home working setup or squash issues. In some cases, clients are ordering laptops and other hardware. Stock levels of laptops have dwindled and we are doing everything we can to source appropriate hardware. Please bear with us whilst we prioritise the incidents. It may be that your support times increase slightly over this busy time.

[23/03/2020 @ 11:00pm]
The UK and Scottish Government have instructed people to stay in their homes. From this evening people must stay at home except for shopping for basic necessities, daily exercise, any medical need and travelling to and from essential work. Consider IT staff are classed as Category 3 key workers, but we will only be attending site in genuine emergencies. One member of staff being unable to work is not an emergency. Minor inconveniences or delays in your working as a result of working-from-home are not emergencies. Please respect our necessary decision to avoid site visits for the sake of our, and your staff’s, health.

[27/03/2020 @ 8:15pm]
We are seeing the influx of support requests reduce back to normal levels. Almost all clients are now working from home where possible. Site visits are still cancelled/postponed with the exception of emergency cases. Responding to site visits is solely at our discretion and the safety your and our staff remains the priority.

 

 

stuart.gilbertson
March 11, 2020
0
Share:
March 5, 2020

Don’t wait for your business to be attacked – be proactive!

Would you leave your house unlocked if nearly half the homes in your area had been burgled? If an attack was likely, would you wait until after the break-in to act?

No? Then why treat your business that way?

As with any breach of security, a proactive response is always better than reactive – why wait for the damage to be done when you can try to prevent it in the first place?

With cyber attacks continually on the rise, it’s really important that all businesses, no matter their size, act proactively in response to the increase in attacks and successful hacks.

You might think reactive IT security will save you money, but it’s only in the short-term. In the longer-term you run the risk of increased financial costs, using the wrong tools for damage control, and no clear way of resolving issues.

Proactive approaches are all about anticipating that something might happen and being prepared for it. Proactive IT security leaves less room for cyber attackers to exploit your systems, and also makes it easier to identify problems sooner – and makes it easier to fix them.

Here are just two reasons why we think being proactive is the best attitude to take towards your IT security:

  1. No more constant clean-up

Unfortunately, cyber-attacks are no longer a rarity. Once upon a time, it might have been worth your while holding off on investing in IT security. Now, when 1/3 of UK businesses suffered an IT breach last year alone, it’s no longer a matter of “if” we see another breach, it’s “when”.

1/3 of UK organisations suffered IT breaches last year, even though 70% invested in some sort of IT security. Without an element of proactive IT security, this figure would be a lot higher.

After an attack, more damage will have been done when you don’t have some element of proactive IT security in place. Attacks damage your safety measures; you likely lose data which causes financial and reputational damage as well.

Clean-up costs can be enough to make your eyes water, and even more when coupled with loss of productively or revenue. It’s best to have security measures continuously in place to lessen some of the damage.

  1. Reactive security measures are often light work for pro-hackers

As much as you might believe otherwise, hackers will generally always be one step ahead – whether it’s through developing stealthier ways to attack, or new ways to hack and fool people.

Even the most unsophisticated hackers have access to coding which can easily evade antivirus (AV) detection. They’re often tuned into AV provider updates as well. This means that hackers get the same messages as clients when they are told to update their systems to account for new hacking codes.

This works as a push for hackers to roll out their new methods – putting businesses one-step behind the criminals.

It’s easy to treat IT security as something you don’t need straight away, but in the long run it’s much better for your company if you’re proactive about it. We can’t pretend a cyber attack just won’t happen – they’re becoming more and more likely every year as we become more globally and digitally-connected.

We can sit back and wait to do something after an attack, or we can be proactive and put in place some preventative measures to make your business less likely to be breached in the first place. Not only will this help put your mind at ease, it can also make your clients and customers at ease that their information will be less accessible to hackers.

With all this in mind, there’s so much that we at Consider IT can do to help you protect your business and your clients from cyberattacks before the take place, saving you in the long-term.

We can help you with everything from support services to improve productivity, increase security and reduce the overall costs to your business, to bring you through Cyber Essentials Accreditations. We’ll turn your back up platform from a “recovery in days/weeks” situation to “we’ll have you online anywhere in the world within 15 minutes”.

We even offer our purpose-built Disaster Recovery suite for your team to use in times of crisis.

Find out about all of the services we have on offer at https://considerit.com/what-we-do/managed-it-services/cyber-security/cyber-essentials/

Get in touch with us on 0131 510 0110 or [email protected] to chat about our IT support services.

David Lewis
March 5, 2020
0
Share:
CONSIDER IT FACEBOOK CONSIDER IT Twitter CONSIDER IT Linkedin

Contact Us

0131 510 0110
[email protected]
Find Us

Customer Service

Contact Us
Our Locations
Case Studies

Information

About Consider IT
Domains
Privacy Policy
Terms & Conditions
Press Enquiries

© 2025 Consider IT Limited – All Rights Reserved
Registered office: Waterview House, 37 Shore, Edinburgh, EH6 6QU. Company Number: SC320341 | VAT number: GB 930 1862 42
Consider IT is a trading name of Consider IT Limited