Cyber-security Posts

Bespin Labs Gains ISO 27001 Certification for IT Security

At Bespin Labs, our mission is 100% Cloud, 100% customer-focused solutions that resolve real-world issues in a safe and secure way. Our commitment to data privacy and safety in the cloud is always front and centre in everything we do. In line with this goal, we opened the Lab to an independent auditor who re…

Read more

How to restore your Google Contacts

Many small and mid-size businesses rely heavily on contacts stored on their mobile phones. But what happens if for some reason you lose a contact or they are accidentally deleted due to a faulty application, it can be quite traumatic, to say the least. In fact, does anyone know they partners mobile number of…

Read more

Scripts and tips to backup G Suite for free

When it comes to backing up your Google G Suite we would always recommend purchasing a proven backup solution from the Google G Suite Marketplace, however for those smaller organisations (less than 50 users) who only require minimal data protection there are free, manual options available in the form of scrip…

Read more

LinkedIn phishing (Whaling)

Today, our CEO, Paul Lees, received a private message on LinkedIn from an old contact asking for input on a proposal. This wasn't uncommon, Paul often gets requests from all kinds of individuals for assistance and guidance. However when selecting the proposal, instead of a document the following was presen…

Read more

Can backups protect you from Ransomware?

Ransomware is on the increase with new organisations falling victim every 14 seconds! It makes sense, therefore, to expect that you're going to be attacked and to plan for it. Obviously good patch management and user training are key to prevention, but there is still a chance you will become a victim of cybe…

Read more

Phishing, spear phishing and whaling

Photo by Ilse Orsel on Unsplash According to the UK government department for Digital, Culture, Media and Sport's 'Cyber Security Breaches Survey 2017' 52% of small businesses have identified at least one cybersecurity breach or attack in the last 12 months. Typically these attacks start …

Read more

Cybersecurity posters

One of the most effective training aids has to be wall posters. We use them for all kind of change management and transformation programmes. The National Cyber Security Centre has created a series of infographics to bring dry technical guidance to life. You're free to download and print these NCSC infographi…

Read more

Cybersecurity – The human element

Having strong security controls in place is critical to every single organisation, however if they are too restrictive you're likely to find your users attempting to circumvent them. On the other hand, if they are too weak you put them and your business at risk. So here are a handful of tips on how you ca…

Read more