Search for anything.

Your search for: "" revealed the following:

Search...

Consider IT
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us

Consider IT
0131 510 0110Contact Us For A Free Quote
[email protected]Consider IT Limited, Waterview House, Edinburgh, EH6 6QU
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us
Consider IT
Consider IT
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us

Your search for: "" revealed the following:

Search...

Category: IT Security

HomeArchive by Category "IT Security"Page 9
Recent Posts
  • Cyber Risks for Charities: How to Safeguard Your Organisation
    Oct 24 2024
  • Upcoming Cyber Essentials Changes in April 2025
    Sep 27 2024
  • Consider IT is now a certified B Corp Text on Blue and Orange background
    Celebrating a New Milestone: Consider IT Becomes a Certified B-Corp
    Jun 04 2024
  • Consider IT blog title: Over 19000 sensitive documents stolen in Volkswagen breach overlayed on orange and blue gradient background
    Volkswagen Group has over 19,000 sensitive documents stolen in Cyber Attack
    Apr 24 2024
  • Blog Title 7 strategies to combat malware and ransomware on a blue and orange gradient background
    Staying Ahead of the Game: 7 Strategies to Combat Malware and Ransomware
    Apr 19 2024
  • Blog title The cost of a cyber attack on a blue and orange gradient background
    Counting the Costs: Understanding the Financial Impact of Cyber Attacks on Businesses
    Mar 19 2024
  • Blog title The Importance of Cyber Security Awareness training on a blue and orange gradient background
    The Importance of Cyber Security Awareness Training
    Feb 28 2024
  • Blog title Why choosing and independent IT support provider trumps big corporations on a blue and orange gradient background
    The Personal Touch: Why Choosing a Local, Independently Owned IT Support Provider Trumps Big Corporations
    Jan 10 2024

Mark Zuckerberg’s Facebook fan page hacked


You’d think the head of Facebook would have tip-top security on all his accounts on Facebook, but you’d be wrong.

Mark’s fan page, which has nearly three million ‘likes’, seemingly posted a message calling for Facebook to transform into a ‘social business’.

However, it was neither Mark nor his PR team who posted the status, which was swiftly removed (but not before over a thousand people ‘liked’ it).

While it’s unknown whether the hacker actually did anything more sophisticated than guess the password for Zuckerberg’s fan page, the fact that such a prominent user can be hacked is worrying to all Facebookers.

Facebook has declined to comment thus far; probably busy trying to think up a new password.

Read more: http://www.techradar.com/news/internet/mark-zuckerberg-s-facebook-fan-page-hacked-923992

stuart.gilbertson
January 26, 2011
0
Share:

Natwest Account Maintenance And Verification Procedures

We monitor a lot of spam messages for clients and have noticed a significant increase in the “Phishing” messages coming in pertaining to be from Natwest. These e-mail messages are fake and do not originate from Natwest or any reputable Bank.

The contents of the email read as follows:

Dear NatWest Customer,
National Westminster Bank have been receiving complaints from our customers for unauthorised use of their Natwest Online accounts
Sign In Here For Your Account Verification

The “Sign In Here” section of the e-mail message actually takes you to a clone of the real Natwest login page. When you enter your details on this page, instead of being authenticated with Natwest’s system, your personal details are simply forwarded to the fraudsters.

Whenever you want to log in to your online banking, always type in the address manually, or at least ensure the address in your browsers address bar is correct. A quick check of the address before logging in can save you hours of struggle and potentially financial losses!

stuart.gilbertson
January 21, 2011
0
Share:

UK doctor loses unencrypted laptop

The medic waited 2 weeks before informing his superiors about the theft. The doctor took unencrypted patient information – including names, dates of birth, the treatments – on 1,147 patients and loaded it onto his laptop, which was stolen in November.

Now, Phil Morley, chief executive at Hull and East Yorkshire Hospitals NHS Trust, which runs Hull Royal Infirmary and Castle Hill Hospital in Cottingham, has written to the 1,147 patients affected to apologise.

In the letter, he said: “I am writing this letter to inform you of the incident and also to apologise unreservedly for the loss of your confidential data.
“The doctor acted outside trust and NHS regulations in taking unencrypted patient data away from the trust and installing it on his personal computer.
“I can advise that the trust treats these matters very seriously and the doctor concerned is being managed in accordance with the trust’s policies and procedures.”

The breach is the third incident of personal data exposure to affect Hull residents in less than a year, following an earlier event involving the theft of sensitive data from A4e.

The trust said the doctor informed police the laptop had been stolen following the theft in November but did not notify the trust until two weeks after the incident.

Cathie Holmes, 37, of Beverley, said she was furious when her 12-year-old daughter, Mary, received one of the letters.

Mrs Holmes said: “You can’t send a letter of that magnitude to a child and expect them to understand it.

Sources:-
http://www.theregister.co.uk/2011/01/19/hull_hospital_data_breach_flap/
http://www.thisishullandeastriding.co.uk/news/Undefined-Headline/article-3111119-detail/article.html

stuart.gilbertson
January 19, 2011
0
Share:

The Importance of Backups: Stolen Cancer Research Laptop

Sook Shin lost the 13-inch white MacBook, that contained years of research on prostate cancer, last Sunday after thieves smashed the window of her car, and made off with the laptop. Data on the machine was not backed up, nor was it encrypted.

Shin told News 9: “I’m devastated…”

Consider IT’s Views:
Making sure that your computer is backed up is important to keeping your information safe and saving you money in the long run. Having to start over when your computers crash and you have no backup is far more expensive than simply paying for the security that comes with having effective backup in place. This is one area that cutting corners is not a good idea.

stuart.gilbertson
January 17, 2011
0
Share:

Regular updates are critical

Don’t Underestimate the Importance of Software Updates

One of the most important aspects of keeping your computer running properly, whether for home or business, is keeping the software updated including adding security patches when they are available.  Edinburgh IT support will tell you that whether you are living in the small fishing village of Cramford or on the coast at Gullane Bents you will surely be better off hiring a support person to take care of all of your computer needs and give you the security of knowing that they will keep your computer up to date on all software and security.

By using the services of an Edinburgh IT support system you will be sure to have constant updating and care of your computer systems for your home or business.  This will allow you to concentrate on using the computer to its fullest capacity without the worry of being out of date on your software and all of your security software. It can be difficult to know what programs are important to keep updated.  The professionals will be more than happy to keep up on what your computer needs and when to get it.  This is a great relief for many who do not want to spend their time worrying about computer updates.

Choosing to hire an Edinburgh IT support professional is one of the best moves to make when you are concerned about keeping your computer, as well as your personal and business information out of harm’s way.  You will want to set a budget before you meet with a professional to discuss their rates and their services.  This will help keep you on track and will give the professional an idea of what you are interested in accomplishing.  They will also need information about your operating systems and what software you typically run most often on your computers.

Understanding what you need from an Edinburgh IT support professional is the best way to ensure you are getting all of the benefits they have to offer.  They will be more than happy to go over the basics of what you should have on your machine and what precautions you should be taking with your security.  You will have the option of hiring a professional on a contract basis or on issue for issue basis. The determination for your needs will need to be made when meeting with your IT professional to discuss the options available to you.

stuart.gilbertson
January 13, 2011
0
Share:

Yorkshire Building Society loses customers’ details on unencrypted laptop

The Information Commissioner’s Office (ICO) has found Yorkshire Building Society (YBS) in breach of the Data Protection Act after an unencrypted laptop belonging to the former Chelsea Building Society (CBS), which had recently merged with YBS, was stolen from its Cheltenham premises. The laptop contained a substantial part of the CBS customer database.

The laptop was recovered within 48 hours after YBS appointed private investigators, and forensic investigations revealed that none of the data had been accessed during that time, although there had been several attempts to do so.

It was later discovered that the manager had written down the passwords to the computer and left these in a bag with the laptop under a desk overnight.

Mick Gorrill, Head of Enforcement at the ICO, said: “It is extremely concerning that an unencrypted laptop containing large amounts of personal data was left unsecured overnight, together with details of its passwords. What’s more, the fact that the employee did not require all the information to carry out the task in hand created an unnecessary risk which could easily have been avoided; employees should only have access to information that is absolutely vital to work which is being carried out.”

Iain Cornish, Chief Executive of Yorkshire Building Society has agreed to take a series of remedial steps to ensure that such a data security breach does not happen again. This will include ensuring that all portable devices including laptops are encrypted (a measure that is already in place at1YBS), that all staff are made aware of the company’s policies for the storage and use of personal data and that staff will only have access to the type and amount of personal data that is necessary for their work.

For more information about getting your business secure and laptops encrypted, see our Business Encryption Services page.

stuart.gilbertson
September 5, 2010
0
Share:

Conmen steal control of computers

A new scam which sees fraudsters calling your home landline and taking control of your home PC is surfacing in Edinburgh.

The conmen, who are thought to be calling hundreds of Edinburgh based PC users, are claiming to work for Microsoft and are warning the PC users that they have an infected computer. They then convince the unsuspecting user to click on a web link directing them to malware which allows the caller access to the remote PC.  This allows them to copy bank details, passwords, and other sensitive data off the computer.

A spokeswoman for Lothian and Borders Police said: “Our advice to avoid falling victim to fraud would be to never engage with someone who cold calls out of the blue and give them access to your computer. If you have concerns about your computer security, ask a known and trusted expert to assist.”

The Edinburgh Evening News Reports: http://edinburghnews.scotsman.com/news/Conmen-take-control-of-home.6488963.jp

stuart.gilbertson
August 23, 2010
0
Share:

Virgin Media customers about to receive warnings

Virgin Media, the UK’s third-largest Internet Service Provider will match lists of compromised IP addresses collected by the Shadowserver Foundation against its customer lists so that they are able to issue a letter of warning about their security.

Subscribers to Virgin Media whose computers are part of a botnet can expect the warning letter telling them to tighten up their security immediately. Those with infected machines will be asked to download free security software to remove the malware and protect their computers and connection.

Virgin Media said it expects to send out hundreds of these letter per week initially, and has plans to expand their campaign based on customer feedback. Virgin Media will also take the opportunity to try and sell its Digital Home Support service offering remote PC maintenance over the phone.

stuart.gilbertson
August 17, 2010
0
Share:

A quarter of all data breaches are from the NHS.

The Information Commissioner’s Office (ICO) remains highly concerned that data breaches involving people’s personal information are continuing to occur in NHS organisations.

Today NHS Stoke-on-Trent and Basingstoke and North Hampshire NHS Foundation Trust are the latest NHS bodies found to have breached the Data Protection Act (DPA). Both NHS organisations’ chief executives have signed formal Undertakings outlining that they will process personal information in line with the DPA.

Mick Gorrill, Head of Enforcement at the ICO, said: “Everyone makes mistakes, but regrettably there are far too many within the NHS…”

The NHS organisations have agreed to implement a number of security measures to protect personal information more effectively. All staff will be made aware of the organisations’ policies for the retention and use of personal data and will receive training on how to follow those policies.

NHS Stoke-on-Trent will also apply physical security measures in respect of paper medical records, particularly when they are in transit. The ICO can issue a monetary penalty for serious breaches of the Data Protection Act.

If your business handles personal or confidential information that should really be encrypted in transit, give Consider IT a call now on 0131 510 0110

stuart.gilbertson
June 16, 2010
0
Share:

Lampeter Medical Practice loses unencrypted memory stick

The Information Commissioner’s Office (ICO) has found Lampeter Medical Practice to be in breach of the Data Protection Act, after an unencrypted memory stick containing the personal details of 8,000 patients was reported lost to the privacy watchdog.

In March 2010, a member of staff downloaded a database containing patient details in contravention of practice policy. The staff member downloaded the information on to an unencrypted and non password protected computer memory stick which was then posted by recorded delivery to the Health Boards Business Service Centre. The memory stick did not arrive at its intended destination and is now accepted to be lost.

Sally-anne Poole, Enforcement Group Manager, said: “It is unnecessarily risky to download 8,000 personal details on to a memory stick. It is imperative that staff are made fully aware of an organisation’s policy for securing personal data and any portable device containing personal information should always be encrypted to prevent it being accessed in the event of loss or theft…”

If your business is at risk of this happening, give us a call and let’s get your data sorted!

stuart.gilbertson
June 4, 2010
0
Share:
1 … 8 9 10 11
CONSIDER IT FACEBOOK CONSIDER IT Twitter CONSIDER IT Linkedin

Contact Us

0131 510 0110
[email protected]
Find Us

Customer Service

Contact Us
Our Locations
Case Studies

Information

About Consider IT
Domains
Privacy Policy
Terms & Conditions
Press Enquiries

© 2025 Consider IT Limited – All Rights Reserved
Registered office: Waterview House, 37 Shore, Edinburgh, EH6 6QU. Company Number: SC320341 | VAT number: GB 930 1862 42
Consider IT is a trading name of Consider IT Limited