At Bespin Labs, our mission is 100% Cloud, 100% customer-focused solutions that resolve real-world issues in a safe and secure way. Our commitment to data privacy and safety in the cloud is always front and centre in everything we do. In line with this goal, we opened the Lab to an independent auditor who re…
Cyber-security Posts
We've always been an advocate of the Directory within an IT system. Our lineage goes back decades to the days of X.500, LDAP, and Novell eDirectory. As cloud adoption continues to rise, we are seeing more and more vendors, including Google, introducing their own directory service, based within "The Cloud". …
It's not clear when the current COVID-19 crisis will be over, Dr Anthony Fauci, one of the top US public health experts warns that it could take most of 2021 or longer to get the pandemic under control and that it is "unlikely" the virus can ever be fully eradicated. However, we all hope that one day, the vi…
Many small and mid-size businesses rely heavily on contacts stored on their mobile phones. But what happens if for some reason you lose a contact or they are accidentally deleted due to a faulty application, it can be quite traumatic, to say the least. In fact, does anyone know they partners mobile number of…
When it comes to backing up your Google G Suite we would always recommend purchasing a proven backup solution from the Google G Suite Marketplace, however for those smaller organisations (less than 50 users) who only require minimal data protection there are free, manual options available in the form of scrip…
Today, our CEO, Paul Lees, received a private message on LinkedIn from an old contact asking for input on a proposal. This wasn't uncommon, Paul often gets requests from all kinds of individuals for assistance and guidance. However when selecting the proposal, instead of a document the following was presen…
Ransomware is on the increase with new organisations falling victim every 14 seconds! It makes sense, therefore, to expect that you're going to be attacked and to plan for it. Obviously good patch management and user training are key to prevention, but there is still a chance you will become a victim of cybe…
Photo by Ilse Orsel on Unsplash According to the UK government department for Digital, Culture, Media and Sport's 'Cyber Security Breaches Survey 2017' 52% of small businesses have identified at least one cybersecurity breach or attack in the last 12 months. Typically these attacks start …
One of the most effective training aids has to be wall posters. We use them for all kind of change management and transformation programmes. The National Cyber Security Centre has created a series of infographics to bring dry technical guidance to life. You're free to download and print these NCSC infographi…
Having strong security controls in place is critical to every single organisation, however if they are too restrictive you're likely to find your users attempting to circumvent them. On the other hand, if they are too weak you put them and your business at risk. So here are a handful of tips on how you ca…