Search for anything.

Your search for: "" revealed the following:

Search...

Consider IT
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us

Consider IT
0131 510 0110Contact Us For A Free Quote
[email protected]Consider IT Limited, Waterview House, Edinburgh, EH6 6QU
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us
Consider IT
Consider IT
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us

Your search for: "" revealed the following:

Search...

Posted by David Lewis

HomeArticles Posted by David Lewis
Recent Posts
  • Cyber Risks for Charities: How to Safeguard Your Organisation
    Oct 24 2024
  • Upcoming Cyber Essentials Changes in April 2025
    Sep 27 2024
  • Consider IT is now a certified B Corp Text on Blue and Orange background
    Celebrating a New Milestone: Consider IT Becomes a Certified B-Corp
    Jun 04 2024
  • Consider IT blog title: Over 19000 sensitive documents stolen in Volkswagen breach overlayed on orange and blue gradient background
    Volkswagen Group has over 19,000 sensitive documents stolen in Cyber Attack
    Apr 24 2024
  • Blog Title 7 strategies to combat malware and ransomware on a blue and orange gradient background
    Staying Ahead of the Game: 7 Strategies to Combat Malware and Ransomware
    Apr 19 2024
  • Blog title The cost of a cyber attack on a blue and orange gradient background
    Counting the Costs: Understanding the Financial Impact of Cyber Attacks on Businesses
    Mar 19 2024
  • Blog title The Importance of Cyber Security Awareness training on a blue and orange gradient background
    The Importance of Cyber Security Awareness Training
    Feb 28 2024
  • Blog title Why choosing and independent IT support provider trumps big corporations on a blue and orange gradient background
    The Personal Touch: Why Choosing a Local, Independently Owned IT Support Provider Trumps Big Corporations
    Jan 10 2024
December 21, 2020

Are your employees an unexpected security threat?

How can you protect your business from the very people who work with you?

While you might have everything in place to protect you from external cyber-attacks, unexpected security threats can come from right under your nose – even from good willed and trusted employees.

It’s all well and good to keep your data safe and secure, but it can just take one employee not following the right security protocols, or disgruntled ex-employees having access to data – and you might find your business in serious trouble.

With the majority of us working remotely, this brings with it a whole raft of security issues – do employees have access to the right servers for their work, are staff updating their apps and systems accordingly, are they using work laptops for personal use?

That’s why it’s so important to drill security practices into everyday actions for staff – while many basic security principles may seem obvious, the consequences of even a minor slipup can be severe.

So, how can you protect your business and data from well intentioned employees who might not be in the know about IT security?

It starts with Cyber-Sensibility, ensuring your staff are well educated with regards to your company’s IT operations, passwords and keeping data confidential and secure.

Start by taking time out to train employees on IT best practices – saving documents to the correct files, ensuring passwords remain secure, and that employees know not to use their computers or laptops for personal use

Consider implementing a password manager for secure and confidential passwords and access to shared services)

Ensuring employees are well-enough educated in regards to cyber-security can be one of the most important methods to keeping safe.

A study conducted by Cyberark discovered over half of all employees are happy to allow co-workers using their login details, meanwhile 45% revealed they don’t tell IT when they download an unauthorised app to their device.

This sort of behaviour comes with severe risks of viruses and hacks, leaving IT systems much more vulnerable to attacks – it’s well worth double-checking staff understand basic IT security to protect themselves and the business.

The next step is to keep on top of remote setups.

The pandemic has seen unparalleled amounts of workers working remotely from home, which has completely moved the goalposts in terms of cyber-security.

A recent survey discovered 95% of security professionals were facing added IT challenges with employees WFH in thrown together home offices not fit for purpose.

Threats like phishing scams and malicious webpages are now having greater impacts than before, posing a huge threat to all businesses and employees.

Your IT security needs adapt to the changing environment, ensuring employees know what potential scams look like through training and flagging up anything they’re unsure about.

Be aware of what potential scams look like, through training and avoiding complacency, keep a distance from anything that could pose a threat, and ensure apps and systems are consistently updated.

What about ex-employees?

The process of removing moved-on workers from your system is another action that has to be taken seriously. It’s estimated that around 92% of UK businesses don’t automate this task as part of an off-boarding process, leaving plenty of room for human error.

Allowing a former employee to have access to your IT systems runs the risk of a whole load of IT security issues.

In fact, a Gurucul study discovered around one in ten workers would take as much corporate data as they could on the way out of a job, with a further 15% saying they would change passwords and even delete files.

Of course, not everyone will take files or change passwords, but that doesn’t mean you shouldn’t be meticulous about your offboarding processes and take all the necessary precautions to prevent data breaches from former employees.

Much of the time, departing staff might not have any ill will but can still leave your business open to data breaches by keeping business files and information on personal computers, failing to handover correct log in details, and not returning all of their company IT equipment.

There are a few ways you can look to prevent this such as wiping work-devices, changing passwords, and removing access to files (especially company social media accounts) and notifying the IT department well in advance about staff changes.

How can we help?

Getting the best IT advice is essential to help prevent breaches and security issues from damaging both your reputation, your business, and your profits.

If you’re interested in how you can improve your business security, please get in touch with our friendly team of IT experts – who will run through everything cyber-related with you.

You can find out about all of our different services here

David Lewis
December 21, 2020
0
Share:
December 3, 2020

Cyber espionage attacks COVID supply chain with phishing emails

How can you make sure staff don’t fall for email scams?

Phishing scams aren’t new to the scene.

In fact, we’ve become so used to the headlines about businesses paying out fortunes to get their data after some unsuspecting employee clicked a dodgy link in an email.

Even today’s (03 December 2020) news from IBM of a targeted global hacking campaign aimed at the COVID-19 vaccine supply chain hasn’t surprised us – it’s something governments and businesses have been warning against for months.

IBM believes the campaign began in September 2020, with phishing emails sent to six countries linked to the delivery ‘cold chain’ used to keep the vaccine at the right temperature when it’s transported.

Attackers reportedly impersonated a business executive from a Chinese company involved in the cold supply chain to trick targets into opening emails, as well as targeting transport organisations with malicious phishing emails asking for log in details.

If successful, hackers could have procured sensitive and confidential information about the distribution of a high value and high priority.

According to IBM’s security researchers, targets included the European Commission, companies involved in solar energy, a software development company in South Korea, and a German web development company.

It’s not just bigger organisations being hit by more phishing scams, smaller businesses can easily could become exposed to scammers purely by the fact that your good-natured employee didn’t think to message or phone their colleague about a slightly odd or unusual email they received.

Covid-19 has created the perfect environment for phishing, with remote working, digital appointments and a rise in health and medical information, hackers are finding it easier to take advantage of people, reaping in the stolen benefits.

From the beginning of the pandemic, fraudsters changed their tune and started using sophisticated methods of exploiting innocent victims and companies – from fake government emails and support schemes to business relief funds, hackers are now more creative than ever.

In February phishing attacks related to HM Revenue and Customs (HMRC) impersonations averaged at 26,100 per month, a figure that by March increased to 40,184 attacks, roughly 73% rise within a month. The number of attacks has steadily been increasing between March and September with recent figures suggesting 57,801 attacks per month.

In August, the HMRC declared it was investigating more than 10,000 email, SMS, social media and phone scams specifically exploiting the pandemic.

These attacks are on the rise, and are becoming more and more convincing. We’ve outlined some vital steps you and your business can take to prevent these attacks and identify the scam before it’s too late.

How to recognise phishing

  1. Emails usually look identical to messages from reputable organizations
  2. The content sounds urgent
  3. The content tries to stir fear
  4. Claims to enclose breaking news or important information
  5. Asks you to download a link or attachment
  6. Email address does not match organisation

How to protect against phishing

  1. Train your staff

It may sound a little boring but it is so important to understand the threat and be able to identify spam emails and webpages as a collective unit.

As harsh as it sounds, staff are often the biggest weak point when it comes to phishing – so it’s vital to train your staff in recognising risky spam emails.

This includes understanding URLs and being able to recognize the ones that are safe and legitimate versus those that are fraudulent.

We offer phishing simulations as a service to help identify and train you and your staff to make your business less vulnerable.

  1. Triple check everything

If uncertain of an email a website or a company, visit the website or google the address. If the site comes up with an error or details are not matched, this should be considered a warning.

If you ever receive any suspect emails, always refer to your colleagues and your IT support team – it’s always better to be safe than sorry!

  1. Invest in your security

Installing and updating anti-spam, anti-virus, and anti-spyware software. Deploying a spam filter that detects unidentifiable senders, webpages, or downloads will prevent any further interaction with spammers and keep your business safe.

It’s all about balance, right? At Consider IT, we can help support your digital and cyber security needs, with our proven cyber security solutions.

Our team of experts can help support your business by securing both technical and operational measures from implementing software to designing new security policies and strategies that work.

With complete protection, we can become the first point of contact for every area of security, directing potential attacks to our expert team who can react sooner and faster.

As a Cyber Essentials Plus-accredited team, we can guide you through security processes to better protect your businesses and employees, helping your business achieve your own Cyber Essentials plus accreditation.

We’re a full CREST-accredited body with CREST-accredited staff, including CREST Practitioner Security Analysts and CREST Registered Penetration Testers.

So, we can help give you peace of mind, as well as helping you protect your business. Becoming accredited is an incredibly powerful way to gain trust and confidence from your customers and workforce.

If you’re interested in how you can improve your business security, please get in touch with our friendly team of IT experts – who will run through everything cyber-related with you.

You can find out about all of our different services here 

 

David Lewis
December 3, 2020
0
Share:
November 19, 2020

The shocking truth behind instant hacks on passwords you rely on

Are your passwords giving hackers access to your accounts in seconds?

How long does it take a hacker to figure out your password? The reality is that millions of apparently secure passwords can be bypassed in seconds.

Think about that. It could mean five to 10 passwords have been compromised in the time it took you to read to this point. Scary stuff.

These kinds of incidents are known as “brute force attacks” and the culprits let computers run through millions of possible combinations at lightning speed until they find the combination. The results can be so fast as to appear almost instantaneous.

Most people have used bike locks, padlocks or other locks which have four-digit combinations. For an ordinary person, forgetting the number is a huge inconvenience. It would be all but impossible to try all 10,000 possible combinations. However, a computer can crack the right code in less than a second.

Mike Halsey, a six-times recipient of Microsoft’s Most Valuable Professional (MVP) award, pulled together this handy table which outlines how easy it can be for a hacker to crack your password, based on whether you’re using just numbers, letters or a combination of upper and lower case letters and symbols.

Click here to see the full post https://www.ghacks.net/2012/04/07/how-secure-is-your-password/

Where do you fit in?

So, how easy is it to make a difference? Easier than you might think. Yet, just a few relatively simple tweaks and updates could turn seconds into years, decades or even centuries when it comes to cracking your passwords.

For example, while the cyber crooks can bypass a four digit password instantly, an eight-character password with a combination of numbers, upper and lowercase letters and symbols poses a far more difficult challenge – taking more than two YEARS of computing power to crack.

As mentioned in our previous blog post on password security, the easiest passwords to crack are those with names, dates, or personal information that a hacker could gather from your social media (parents’ names, a birth place, or even your date of birth).

If you’re using personal details in your passwords, you can be providing the exact information a hacker needs to gain access to your emails, bank accounts, work data – nothing’s off limits once your password is in the hands of a hacker.

How can you protect yourself against hacks?

The best possible protection you can give yourself is to create a password with a strong combination of different letters, numbers and symbols. Numbers can be easily substituted for the letters O and S – and the longer the password, generally the better.

Avoid using names, football clubs, fictional characters – anything really easily identifiable. Last year, the National Cyber Security Centre published an analysis of the 100,000 most commonly used passwords that have been accessed by third parties.

The top passwords used by British people included:

  • 123456
  • 123456789
  • qwerty
  • password
  • 11111

While some of the most-used words were:

  • Ashley (used 432,276 times)
  • Michael (425,291)
  • Liverpool (280,723)
  • Blink 182 (285,706)
  • Superman (333,139)

To make your accounts more secure, considering making your passwords longer, with combinations of characters. Enable two-factor authentication on whatever devices you can. This doesn’t just apply to your personal social media accounts, it’s also important to keep in mind for your business and professional accounts.

You might also want to consider using a password manager to create and store complex passwords for you. There are also many affordable and user-friendly password management services, which create uncrackable passwords for all of your services (social media profiles, online banking) – then securely log you in whenever you need access. Popular options include LastPass, Dashlane and 1Password.

If you’re interested in how you can improve your business security, please get in touch with our friendly team of IT experts – who will run through everything cyber-related with you.

You can find out about all of our different services here

David Lewis
November 19, 2020
0
Share:
March 18, 2020

Is your social media really safe?

If you’ve read our blog on CEO fraud, you’ll know that hackers are getting more and more sly when it comes to different ways to attack people and businesses.

Whether it’s through hacking IT systems, sending fake emails or carrying out malware attacks, there are so many different ways a hacker can actively get into your systems and find out sensitive information about you or your business.

But, did you know you might be giving hackers easy access to your private information through your own social media?

Have you heard of doxing? Doxing (or reconnaissance) is the way criminals research and gather information about a target before using it maliciously, whether its by hacking directly, guessing passwords, or even going so far as to create the perfect, personalised trap to target you.

Cyber criminals look to collect all of the information available about you, and social media can make you an easy target.

We willingly and freely publish so much personal information about themselves publicly on social media, from friends and family members to photographs, home and workplace addresses – all of which makes us more vulnerable to attack.

Passwords and password recovery answers often use seemingly innocuous details like children’s names, pet’s names, their year of birth, place of birth. But, when researched on social media and combined, these can be the perfect tools to unlock your email, social media and bank accounts.

Even more concerning, stats released by the National Cyber Security Centre last year showed millions of people in the UK used combinations of basic, easy-to-guess passwords including:

  • Passwords that include basic information that can be found easily from your social media – including your real name or username and family names, the football team you support.
  • Place names, birthdays, or single dictionary words.
  • Numerical or keyboard sequences (e.g. QWERTY, 12345)
  • Names of comic book characters and bands

These types of passwords are easy to guess and pose a threat the security of your accounts. Hackers will be able to easily guess these types of passwords by analysing your personal information and making informative guesses.

Make it more difficult for hackers by taking extra steps to minimise these threats.

There are simple, straightforward ways to make your social media more secure, including making social media profiles private and removing anyone you don’t personally know from your following. Enabling two-factor authentication with phone numbers and separate emails can also make your online presence more secure.

Other ways to secure your accounts include:

  • Regularly updating apps
  • Blocking unknown accounts
  • Making your passwords long, with combinations of upper- and lower-case letters, symbols and numbers
  • Be careful when logging into accounts through email links – always check the sender details because this is another popular phishing scam
  • Never share your passwords with anyone
  • Use different passwords for different social media accounts
  • Consider using a password manager

 

By making these simple changes, you can protect your own personal information from being analysed by potential hackers. By being aware of the dangers and taking some proactive, positive steps to reduce these risks can help keep your information from falling into the wrong hands.

These tips apply to your personal social media accounts, as well as your business and professional accounts. Want to talk to us about your business security? We offer a range of services including Cyber Essentials and Cyber Essentials Plus, backup services, a top-range Disaster Recovery Suite, and IT support.

 

You can find out more about all of our different services at https://considerit.com/what-we-do/managed-it-services/

David Lewis
March 18, 2020
0
Share:
March 5, 2020

Don’t wait for your business to be attacked – be proactive!

Would you leave your house unlocked if nearly half the homes in your area had been burgled? If an attack was likely, would you wait until after the break-in to act?

No? Then why treat your business that way?

As with any breach of security, a proactive response is always better than reactive – why wait for the damage to be done when you can try to prevent it in the first place?

With cyber attacks continually on the rise, it’s really important that all businesses, no matter their size, act proactively in response to the increase in attacks and successful hacks.

You might think reactive IT security will save you money, but it’s only in the short-term. In the longer-term you run the risk of increased financial costs, using the wrong tools for damage control, and no clear way of resolving issues.

Proactive approaches are all about anticipating that something might happen and being prepared for it. Proactive IT security leaves less room for cyber attackers to exploit your systems, and also makes it easier to identify problems sooner – and makes it easier to fix them.

Here are just two reasons why we think being proactive is the best attitude to take towards your IT security:

  1. No more constant clean-up

Unfortunately, cyber-attacks are no longer a rarity. Once upon a time, it might have been worth your while holding off on investing in IT security. Now, when 1/3 of UK businesses suffered an IT breach last year alone, it’s no longer a matter of “if” we see another breach, it’s “when”.

1/3 of UK organisations suffered IT breaches last year, even though 70% invested in some sort of IT security. Without an element of proactive IT security, this figure would be a lot higher.

After an attack, more damage will have been done when you don’t have some element of proactive IT security in place. Attacks damage your safety measures; you likely lose data which causes financial and reputational damage as well.

Clean-up costs can be enough to make your eyes water, and even more when coupled with loss of productively or revenue. It’s best to have security measures continuously in place to lessen some of the damage.

  1. Reactive security measures are often light work for pro-hackers

As much as you might believe otherwise, hackers will generally always be one step ahead – whether it’s through developing stealthier ways to attack, or new ways to hack and fool people.

Even the most unsophisticated hackers have access to coding which can easily evade antivirus (AV) detection. They’re often tuned into AV provider updates as well. This means that hackers get the same messages as clients when they are told to update their systems to account for new hacking codes.

This works as a push for hackers to roll out their new methods – putting businesses one-step behind the criminals.

It’s easy to treat IT security as something you don’t need straight away, but in the long run it’s much better for your company if you’re proactive about it. We can’t pretend a cyber attack just won’t happen – they’re becoming more and more likely every year as we become more globally and digitally-connected.

We can sit back and wait to do something after an attack, or we can be proactive and put in place some preventative measures to make your business less likely to be breached in the first place. Not only will this help put your mind at ease, it can also make your clients and customers at ease that their information will be less accessible to hackers.

With all this in mind, there’s so much that we at Consider IT can do to help you protect your business and your clients from cyberattacks before the take place, saving you in the long-term.

We can help you with everything from support services to improve productivity, increase security and reduce the overall costs to your business, to bring you through Cyber Essentials Accreditations. We’ll turn your back up platform from a “recovery in days/weeks” situation to “we’ll have you online anywhere in the world within 15 minutes”.

We even offer our purpose-built Disaster Recovery suite for your team to use in times of crisis.

Find out about all of the services we have on offer at https://considerit.com/what-we-do/managed-it-services/cyber-security/cyber-essentials/

Get in touch with us on 0131 510 0110 or [email protected] to chat about our IT support services.

David Lewis
March 5, 2020
0
Share:
January 29, 2020

Don’t miss this opportunity to protect your business for free

You read that right – now is the time to sign up for a chance to stake a claim on vouchers worth up to £1,000 to help protect your business from online threats.

We’re so proud of our Cyber Essentials accreditation, we want your business to have a slice of the pie as well.

We want you to stake a claim on the £500,000 pot up for grabs through the Government’s Cyber Essentials Voucher Scheme – before it runs out.

The Cyber Essentials scheme aims to improve Scotland’s cybersecurity, making it one of the most secure places to do businesses.

We’re one of a handful of CREST-accredited specialists in the country which can deliver Cyber Essentials, while helping you claim back up to £1,000 of the costs from Scottish Enterprise.

With hundreds of high-profile IT security breaches happening every year, cybersecurity should be a top priority for any business as it affects every one of all shapes and sizes.

If your business falls victim to a cyber-attack, the costs involved in recovery can be incredibly expensive, so why not help protect your business with a government grant – how easy could it be?

Becoming CREST-certified can protect your business from up to 80% of cyber risks. It also shows your customers and clients that you’ve taken a proactive approach to security – giving you an edge over your competitors.

Our team of IT experts is one of the very few teams in Scotland which can manage both Cyber Essentials and Cyber Essentials Plus certifications for clients.

Both certifications involve a rigorous assessment of business processes, data security and security testing. CE Plus involves double the tests on a client’s infrastructure – including assessments of exposure to malware, internal vulnerabilities, workstations and mobile devices.

Cyber Essentials is an intensive undertaking, but it’s well worth it – and even more so when the government is helping to foot some of the bill.

Early March 2020 has been earmarked as the closing date for applications to the scheme, so what are you waiting for?

You can find out more about Cyber Essentials and all of our services at https://considerit.com/

David Lewis
January 29, 2020
0
Share:
December 20, 2019

They say there’s no such thing as a free lunch…

When people say there’s no such thing as a free lunch, they’re usually on the money – but not in our case.

We’ve created a completely 100% free tool that anyone, anywhere in the world can use with absolutely zero catch.

That’s right, no subscriptions needed, no sign-ups required, no data taken – we don’t ask for anything in return. As our good deed to round out 2019 we’re helping businesses (both clients and non-clients) to upgrade their computers from Windows 7 to Windows 10.

Most in-house IT teams and specialist IT support companies are helping organisations upgrade their PCs to the new version of Windows but very few are doing it for free.

To ease the burden on any businesses panicking about the upgrades, we developed our own Window 10 installer which allows anyone to seamlessly upgrade their operating systems.

The process for migrating from Windows 7 to Windows is actually really straightforward, which is why we were surprised to learn that a council spent £34,000 in November to help them upgrade all of their machines (which didn’t include the cost of the licence either).

While businesses will still have to pay Microsoft for their new Windows 10 licences, our free tool will allow the upgrade to happen on both Windows Business and Windows Enterprise versions of the system – our tool doesn’t care which is being rolled out. It will also work for businesses of all sizes with any number of PCs.

Silicon Valley giant Microsoft is ending its support for the popular operating system from January 2020. Windows 7 will cease to operate from January 14th 2020, leaving businesses scrambling to upgrade their outdated operating systems to Windows 10.

While Windows 7 machines will still work, Microsoft is retiring the 10-year-old platform. That means the tech giant will no longer provide any technical support for any issues and users will no longer receive software updates or security fixes, otherwise known as “patches”.

Microsoft has told users: “While you could continue to use your PC running Windows 7, without continued software and security updates, it will be at greater risk for viruses and malware. Going forward, the best way for you to stay secure is on Windows 10.”

Microsoft also says it is possible for users to upgrade Windows 7 machines to run the Windows 10 operating system, its advice is that PCs should be replaced with newer machines.

Anyone interested in accessing our free Windows upgrade tool can find out more, and access the code at https://considerit.com/resources/windows-7-to-windows-10-tool/ 

David Lewis
December 20, 2019
0
Share:
November 7, 2019

“Hack-Proof” NordVPN Confirms Attack

When the news broke on Monday 21st October that self-proclaimed “hack-proof” VPN service NordVPN was the victim of a hack in March 2018, we were surprised – but not shocked.

Hacks, leaks and security breaches can happen to any company – even privacy giants who claim to have complete cybersecurity at the heart of their product. No organisation should ever claim to be 100% “hack-proof”.

The point of a virtual private network (VPN) is to make your data private by sending your surfing traffic to different servers in different countries – essentially masking what websites you’re browsing. VPNs are used by millions of people as an easy way to maintain some level of privacy online.

NordVPN prides itself on data privacy and complete protection, claiming to shield their customer internet activity with Double VPNs, military-grade encryption and CyberSec (some of the most seriously cutting-edge security technologies around). NordVPN is one of the most popular VPN providers in the world with over 5500 servers in 59 countries.

Customers around the world were right to be concerned when they found out that their private data may have been accessed by hackers, especially when NordVPN claims to have a “zero log” policy, which means they don’t track, collect or share any user data.

NordVPN admitted a server in a data centre in Finland had been accessed by an attacker last year, by exploiting a vulnerability of one of the remote server providers.

An expired internal private key had been exposed, which means hackers could have intercepted traffic and viewed the websites users were visiting. A hacker could have also potentially performed dangerous man-in-the-middle attacks on users by pretending to be a NordVPN server. This means if users were typing in private information – like credit card numbers or addresses – on other websites while using NordVPN their details could have been stolen.

More worryingly, the management interface used by the server gives hackers free reign over the system – commonly referred to as “God mode”.

NordVPN has claimed no user credentials were intercepted and that no other server on the network was affected. NordVPN didn’t name the server in the statement on their website, but said that it had ended the contract it had and shredded all of the servers they had rented from the provider.

The server was vulnerable between January 31st and March 20th 2018, but NordVPN has said it was breached on only one occasion during March.

We haven’t heard how long the attacker had access to the server for, whether it was hours, days or even months. It’s also not clear how many users were affected and how much traffic was intercepted.

Even though the server doesn’t exist anymore, and NordVPN claims no user credentials were intercepted, this attack is a serious reminder of how vulnerable a company can be.

Companies should be aware of any potential issues or weak spots in every aspect of their IT security and should be more vigilant if using external server providers so that they can be aware of any possible vulnerabilities a provider might bring. The bottom line is, no company can ever claim to be 100% “hack-proof”.

 

Get in touch with us on 0131 510 0110 or [email protected] to chat about our IT support services.

 

David Lewis
November 7, 2019
0
Share:
November 1, 2019

Why did 1/3 of UK businesses suffer an IT breach in 2019?

1/3 of UK businesses suffered IT breaches in 2019, even though 70% have IT security.

32% of all UK businesses identified IT security breaches in the last 12 months – and alarmingly 60% of those were large and medium-sized companies.

These breaches occurred in spite of the fact that seven in ten businesses have invested some level of spending in IT and cyber security, with 33% of them having formal cyber security policies in place.

The shocking findings come according to the Cyber Security Breaches Survey 2019.

UK businesses of all sizes invest money into IT and cyber security for several reasons. The most common reason is to protect customer data, followed by preventing fraud or theft and protecting assets such as cash or intellectual property.

IT and cyber security breaches can be extremely costly for business. The average annual cost for a company which lost data as a result of breaches was £4,180 this year, an increase on the average cost in 2018.

The question remains: why are companies which have invested in IT security and training still regularly suffering security breaches?

It’s important to start by identifying the most common security breaches. These include staff falling victim to phishing attacks, fraudulent emails and online impersonations of an organisation, and malware and viruses.

IT security breaches can occur even with IT support – the most common reason being human error in opening phishing emails or unsecure links. A lack of staff awareness around backing up data and creating strong passwords can also lead to security breaches. We offer a wide range of staff training and guidance for clients to help them understand how best to protect against these types of breaches.

A third reason why IT security breaches occur is down to machines or devices that have dropped out of IT’s sight. At Consider IT, we regularly carry out vulnerability scanning to source and resolve any issues or concerns we come across. We also manage and maintain our client’s servers and endpoint patching, and update systems weekly.

At this point, the general thought towards IT security and cyber security breaches is that it’s likely going to happen and there’s no real concrete way to stop it if an attacker is dedicated enough.

We recommend taking a proactive approach to IT security as this is much more effective than waiting for a breach to happen and reacting after the damage has been done. We focus on reducing the impact of breaches and ensuring our clients can recover swiftly and easily if a security breach does occur.

For company-wide safety, we offer a wide range of staff training programmes to ensure clients are in the safest hands. Through our Cyber Essentials and Cyber Essentials Plus schemes, we offer easy solutions to sometimes complex problems. Our human touch puts your people at the heart of your tailor-made security plan that won’t skimp on productivity.

Protect you data, your network and your people by talking to our team today. Get in touch with us on 0131 510 0110 or [email protected] to find out more about our IT support services.

 

David Lewis
November 1, 2019
0
Share:
October 17, 2019

Edinburgh IT firm hopes its eerie “ghost office” will never be needed – unless disaster strikes

Consider IT creates a sleek office suite for disaster recovery in Edinburgh 

Consider IT's office designed for disaster recovery in Edinburgh

 

A DYNAMIC IT support firm has created a stunning 18-desk office in a prime city location – in the hope it will never be used.

Staff at Consider IT in Edinburgh have dubbed the sleek workplace a “ghost office” because the stylish desks and chairs are eerily empty and the powerful PCs at each workstation are left on, with no users, for updates and testing.

Despite investing heavily in an office set up which would be the envy of countless small businesses across the city, the team at Consider IT hope it will remain empty – although it can be operational with just a few moments notice.

Now the man who took the decision to create the bizarre, Mary Celeste-style, deserted office suite says it is a gamble that has paid off and has brought in a raft of valuable new business.

Dad of two Stuart Gilbertson, founder and MD of Consider IT said: “It’s our disaster recovery suite and we put loads of thought, care and attention into creating it. We are very proud of the set up.

“This is a vital insurance policy for those clients who are signed up for our disaster recovery service. If something catastrophic happens in their business, they have peace of mind knowing that their team can be back at work within minutes – with access to all of their computer systems, files and phones as if they were working at their own office.

“Of course, like most insurance policies, we hope it is never needed. The longer our Disaster Recovery Suite lies empty, the happier everyone can be. We know how weird it seems to have such an attractive office space lying empty for months on end. But when it is needed, it will be a genuine lifeline.

“The ability to quickly get a team back to work after a fire, flood or similar disaster can be the thing that helps a business to survive. Giving staff a pleasant, temporary work environment after that kind of trauma is also incredibly important.”

 

The firm has around 70 clients across Edinburgh, Glasgow and London, and since being founded in 2007, it has enjoyed continuous growth and has built up a £1.2m-a-year turnover.

Its fleet of orange and white branded support vehicles have become a familiar sight across the city, with its team of highly qualified technicians working with many of the city’s best-known SMEs, including the Faculty of Advocates, The Federation for Industry Sector Skills and Standards, Nile and Par Equity.

Stuart, 33, a computer networks graduate from Edinburgh Napier University, recently took the bold decision to move the flourishing IT company into a prominent office building in the heart of Leith’s bustling docklands.

Despite the huge cost increases and other risk of moving from modest 1400 sq ft offices into a plush new setting of over 3550 sq ft, Stuart believed the gamble was worth it to underline his firm’s business continuity credentials.

The former Broughton High School pupil added: “It was a massive risk and there were points where I thought we had bitten off more than we could chew. But we needed to make a big, splashy, bold statement to set ourselves apart that reflected the superior service that we offer.

“We’ve made our name as an IT support company, complete IT infrastructures with intricate networks, hosting high end servers and workstations.

“But we are so much more than that and this really helps define us by making it absolutely clear how committed we are to business continuity and being recognised as the gold standard.

“It’s a fantastic space, with some of the best and most sought-after views in Leith. So, the irony isn’t lost us on us that it simply sits empty all the time.

“But we now bring potential clients to see the disaster recovery suite for themselves and often that is the clincher for them. They can see we are serious, that we have got their backs. This simply isn’t a service that our rivals can offer.

“In the past six months alone, we have signed up at least five major clients on the strength of our disaster recovery suite, as well as the other, robust business continuity services we offer, including data backup services and IT managed services.”

Stuart Gilbertson, founder and MD of Consider IT helped to create the sleek office for disaster recovery in Edinburgh

Stuart says such disaster recovery services are often associated with giant firms like IBM and thought to be out of reach for smaller businesses. However, Consider IT works predominantly with businesses which have 20-300 staff.

The disaster recover floor also boast a chill out room, a pool table, a state-of-the-art meeting room for up to15 people which also offers advanced presentation and teleconferencing facilities. There is also a kitchen, a bar and even a shower area.

The space has to be carefully maintained and regularly tested. But while it lies empty, Consider IT does offer use of the impressive meeting room to clients. Stuart says many have taken up the chance to use the facility to host important meetings and private negotiations – some of which are international with the board rooms high tech conference set up.

He added: “We also have our own offices on the floor below which are also well-appointed. Our team were delighted when we moved and have been happier and more productive since. All in all the gamble has paid off handsomely.”

With growth, driven by word of mouth recommendations from satisfied clients, Consider IT has become the ‘go to’ IT support company in the city, recognised as a leader in daily support, VOIP provision and cyber security.

The friendly team pride themselves on a reputation for no-nonsense and jargon-free communication which its clients love. While IT support is a serious business, the staff are also a quirky and fun-loving team.

Par Equity has signed up to Consider IT’s Disaster Recovery Suite, not just to cover themselves for the risk of losing access their office as a result of a fire or power cuts, for example, but as part of their continuous improvement programme which focuses on cyber-security, client service and business continuity.

Could your business benefit from disaster recovery in Edinburgh?

Get in touch with us on 0131 510 0110 or [email protected] to find out more about our Disaster Recovery Suite and IT support services.

David Lewis
October 17, 2019
0
Share:
CONSIDER IT FACEBOOK CONSIDER IT Twitter CONSIDER IT Linkedin

Contact Us

0131 510 0110
[email protected]
Find Us

Customer Service

Contact Us
Our Locations
Case Studies

Information

About Consider IT
Domains
Privacy Policy
Terms & Conditions
Press Enquiries

© 2025 Consider IT Limited – All Rights Reserved
Registered office: Waterview House, 37 Shore, Edinburgh, EH6 6QU. Company Number: SC320341 | VAT number: GB 930 1862 42
Consider IT is a trading name of Consider IT Limited