Phishing emails are the scourge of our inboxes and there seem to be more and more each week, so what should you do when you receive a phishing email?

The aim of phishing emails is for the sender of said emails to obtain sensitive information from the recipient. This goal is realized by cleverly disguising the email to make it look as genuine as possible and, therefore, gain the recipient’s trust. Data targeted by phishing emails usually relates to sensitive details including login details and passwords. And this data leakage can cause serious harm to businesses with the average cost of a phishing attack on a medium sized business costing around $1.6 million.

No organization that wants to remain productive and competitive wants to deal with the chaos of a phishing attack, so we’re going to take a look at what you should do when you receive a phishing email.

Do Not Open Phishing Emails

The best way to avoid the dangers of phishing emails is very simple: Don’t open them! This, of course, is easier said than done as phishing emails have become incredibly sophisticated over the years e.g. spoofing email addresses. However, if for any reason whatsoever you do not recognize an email address or there’s something unusual about the email subject then it’s always best to err on the side of the caution. Instead, move the cursor away and get your IT team to investigate it before going any further.

Leave Links Well Alone

Opening a phishing email isn’t enough, on its own, to activate the malicious payload, but it’s very simple to do so. Phishing emails often contain links which, once clicked, send the user to malicious websites where malware is automatically downloaded to the user’s PC. This malware is usually very discreet and is able to run silently in the background where it is able to log keystrokes or even take control of the user’s PC. So, remember: if you don’t recognize the sender of an email, it’s crucial that you never click their links.

Don’t Respond

Phishing emails will often try to gain your trust by establishing a connection, so you need to be mindful of these deceptive tactics. By hitting the reply button, for example, you’re demonstrating to the hacker that not only is your email account active, but that you’re willing to engage. And, if a phone number is provided, never ever ring it as it will involve further social engineering and potentially a very high phone charge to a premium member. It may be tempting to respond, but always say no and move away from engaging.

Report the Email

Any form of hacking represents a serious threat to the security of your organization, so it should be every employee’s duty to report a phishing email as soon as possible. This allows your IT team to analyze the email and its contents before taking action. This could be as simple as deleting it securely or telling you that, actually, it’s safe to open. Ultimately, shared knowledge allows your entire organization to stay on top of phishing emails, so, even if you’ve clicked something you shouldn’t have, report it immediately.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Your server is the backbone of your organization’s IT functionality, but what do you need to consider when it’s time to upgrade?

Purchasing and installing a new server is a massive move for any organization. Install the best server for your needs and your productivity should skyrocket. Choose one that doesn’t quite fit with your business and it will seriously harm the way you’re able to operate. Therefore, choosing the correct server is important if you value your organization’s future.

Moving forward, though, isn’t always straightforward due to the complexity of such an upgrade. To help simplify matters, we’re going to share five things to consider when upgrading your servers.

  1. The Right Performance

First and foremost, you have to make sure that any potential new server is able to meet the needs of your organization’s IT needs. The main reason that an organization looks to upgrade is because the current technology isn’t able to fulfill their existing needs. Consulting with various department heads and IT professionals is essential to gauge the necessary requirements, so start by compiling this information and work from there.

  1. Is Integration Possible?

You’ve more than likely got an existing server in place, but upgrading doesn’t mean that you need to chuck your old one out with the trash. In fact, it’s possible that you’ll be able to integrate vast sections of your existing server into your new server. Not only does this potentially save you costs on new technology, but it also provides a level of consistency in terms of staff knowledge on the existing technology.

  1. Costs?

Performance, of course, is paramount, but price is equally important as all organizations work to a strict budget. Once you understand your performance needs, the next step is to evaluate which available servers meet this most closely. Technology, after all, can be costly, so you shouldn’t be paying for any technology that won’t be of use to your organization’s output.

  1. Factor in Maintenance

A brand new server is fantastic, but even the most up to date technology needs to be maintained. Any length of downtime is disastrous for any organization which understands the basics of productivity, so the shrewdest move with servers is to ensure that some form of maintenance cover is put in place. Often, there will be a warranty included with new technology, but this will always have an expiry date, so make sure you start asking about extended warranty options from an early stage.

  1. Future Upgrades?

It may seem counter-intuitive to consider future scalability as you upgrade, but looking to the future is vital when it comes to working with IT technology. The rapid pace at which technology expands means that you may need to consider growing your server a lot sooner than you expected. Discussing expansion options is crucial to safeguard against being lumbered with huge costs in the future when your existing technology is unable to expand further to keep pace.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Due to our reliance on data technology, good disaster recovery processes have never been more vital. However, how do you plan for better disaster recovery?

It may be a challenge, but you don’t need to feel apprehensive when trying to tackle this complex problem. And when it comes to disaster recovery, planning is the most important factor. If your IT systems fail then you need to start your recovery process as soon as possible and ensure it’s as effective as it can be. The sooner you can restore normal operations, the less your productivity is affected.

So, if you want to make sure your disaster recovery procedures are finely tuned, make sure you incorporate the following tips. They could be the difference between no IT infrastructure and one that can keep your organization functioning.

Have a Plan

The first step towards having a better disaster recovery plan is to have a plan. Unfortunately, many organizations find themselves too busy to worry about potential disasters and, instead, concentrate purely on the present. While this may help you with your immediate business objectives, it’s not going to help you in the case of an emergency. Therefore, starting work on a disaster recovery plan needs to be sooner rather than later.

Cost isn’t Everything

It’s understandable that budgets are essential when it comes to good business, but disaster recovery plans for IT infrastructure are a little different. Without a fully functioning IT service, it’s unlikely your organization is going to be able to trade at its full potential, if at all. And this is why you need to be careful when looking at the technology and services required for your data recovery. Naturally, you shouldn’t spend an exorbitant amount of money that could cripple your margins, but you also need a data recovery plan which can recover your IT infrastructure quickly and effectively.

Understand Your Recovery Objectives

Key to a good recovery process is understanding what data is crucial and how soon it’s required in the case of a data outage/loss. Objectives, of course, need to be achievable, so don’t burden yourself with unattainable goals such as ‘every worker to have access to emails within 10 minutes of a data disaster’. The best way to test your objectives and measure how attainable they are is through regular testing. This should prepare you for any future scenarios and guarantee that you know how to manage their impact.

Update Your Recovery Plan

If you’re lucky, your organization will manage to operate for a long time without experiencing any data disasters. However, this can lead to a dangerous sense of inertia creeping into your recovery processes. And, as we all know, technology moves at a rapid pace. Software and hardware can be replaced on a yearly basis and these new developments may not chime harmoniously with your existing recovery plan. Accordingly, your disaster recovery plan needs to be regularly reviewed to ensure that it’s current and matches your existing IT landscape.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


 

There’s a good chance that the benefits of the Internet of Things (IoT) could make a huge difference to your organization, but how do you get started?

With around 30 billion IoT connected devices due to be in use by 2020, the IoT is clearly here to stay and the benefits in business are immense. Improved communication, enhanced automation and increased productivity are just a few of the benefits on offer. And, if you’re in business, then you’ll know that these benefits alone are crucial.

However, the IoT world is still relatively new and many organizations are apprehensive when it comes to introducing it to the workplace. Rather than leaving you adrift as your competitors surge forward, we’ve put together some tips on how to introduce the IoT into your organization.

Meet with IT Professionals and Create a Plan

The IoT may seem fairly straightforward in terms of how all the various devices connect, but the truth is that the IoT can be highly complex. Therefore, you need to speak to IT professionals. With their years of expertise in IT innovation, they will be able to recommend the correct technology and how you can begin to implement this into your existing IT network. Otherwise, you will never experience the full range of benefits that IoT can provide.

Understand Why You Need the IoT

If you want to embrace the IoT then you need to understand what it can do for your organization. There are, as previously stated, many benefits on offer from adopting the IoT into your operations, but not all of them will apply to your needs. And that’s why you need to identify the key problems within your business that the IoT can solve. Perhaps it’s increased productivity, perhaps it’s enhanced data processing. Either way, in order to implement the IoT correctly, you have to understand these problems from the very start.

What Can Your Current Setup Provide?

Introducing the IoT doesn’t mean that you have to start from scratch when it comes to your existing IT infrastructure. Many business owners, however, worry that the costs will spiral out of control, but this couldn’t be further from the truth. Sure, there may be the need for certain upgrades to be made to accommodate IoT technology, but plenty of your existing technology will be able to provide a seamless transition. Carrying out a full analysis of your equipment and understanding its capabilities will allow you to identify the areas which need updating.

Establishing Good Staff Training

As with any new form of technology, the IoT will require a certain level of training for your staff. Their existing knowledge of the IoT and the level of interaction they will have with the IoT in your organization will vary, but training is essential. This can be offered either in-house or by external training courses that specialize in training in IoT practices. Once your staff has received the relevant level of IoT training required you’ll find that the integration process is as hassle free as it can be.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


We receive so many emails in business now that they’re a keen target for hackers. As a result, your organization needs to be more wary than ever with email.

The most common way for a hacker to take advantage of emails is by loading them with malicious links. These can be used to extract personal information, activate ransomware or send users to dangerous websites. And these emails are more than likely hitting your organization every day. Whilst the majority of emails with links embedded in them are genuine, it only takes one rogue email to cause severe problems.

To help you avoid the wrath of hackers, we’ve put together four questions you should ask before clicking an email link.

  1. Do You Recognize the Sender?

Trust is crucial when it comes to dealing with links contained within emails. If you don’t recognize the sender then the link should definitely be treated with caution as it could easily be a malicious link. Emails from work colleagues should be more trustworthy, but it’s always possible that their email account has been hijacked. So, even if you recognize the sender, there are still plenty of questions you need to ask.

  1. Does the Link Look Genuine?

If you received an email advising you to visit the Ophtek website then it would look something like www.ophtek.com or ophtek.com. However, if a hacker is trying to trick you into visiting a malicious website then the link may read slightly different e.g. ophtek.org or ophteksupport.com. If you’re ever unsure about the URL listed in a link then try Googling the URL and see whether it brings up a genuine website.

The other factor to look out for is whether the link written in the email is genuine. While the link could say www.ophtek.com the actual destination contained within the link could be completely different. Thankfully, you can double check this by hovering your cursor over any email link to display a popup window that lists the genuine destination.

  1. Do You Even Need to Click the Link?

A high number of malicious links prey on our worries, so, for example, emails that claim your bank account has been hacked are very common. The email will usually contain a link that promises to start an authentication process to secure your account, but these links are never genuine. More often than not, the email will reference a bank that you don’t even have an account with, so there’s absolutely no need to click any links inside it.

  1. Why is it a Shortened Link?

Shortened links may save space in emails, but there’s no reason why they should be used in business emails. More importantly, shortened links – provided by platforms such as Bit.ly and Goo.gl – are yet another way that hackers can disguise the destination of a link. Shortened links are particularly difficult to judge as, even if you hover your cursor over them, it’s impossible to tell where they will send you. Help is at hand, though, from platforms such as CheckShortURL which can expand shortened links to show their true destination.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More