claireLOGIC
  • Managed IT
    • Managed IT Services
    • IT Support Services
    • IT Strategic Review
  • Cyber Security
  • Cloud Solutions
    • Cloud Solutions
    • Microsoft 365
  • Business Continuity
    • Business Continuity Services
    • WhatsApp Archiver
Contact us Resource centre

2023 Cyber security – download our eBook

2023 Cyber security – download our eBook

When looking back at 2022, it was a turbulent year, full of macroeconomic and geopolitical risk. From the war in Ukraine to rapid inflation and supply chain failures, it has been the perfect storm of interlocked risks. This has had a profound effect on cyber security for businesses in the UK, Ireland and the rest [...]

The Pros and Cons of BYOD Policies

The Pros and Cons of BYOD Policies

Bring your own device IT policies (often called BYOD policies) are often seen as a way to save money and increase productivity. However, there are both good and bad aspects to this policy. The pros of BYOD policies The pros include the ability for the employee to have more control over the device they use, [...]

Defence in Depth Layer one: Email and Web Security

Defence in Depth Layer one: Email and Web Security

Email and Web Security: Are your IT systems protected by more than one layer of security? Relying on a singular cyber security system is a huge vulnerability and opens up your network to harm and risk. Defence in Depth (DiD) is a cyber security strategy that uses multiple layers of security to protect a business’s critical assets [...]

Defence in Depth Layer two: perimeter security

Defence in Depth Layer two: perimeter security

Perimeter security: Relying on a single layer of security for your IT systems is a problem that can have serious consequences. It’s important to understand the risks associated with relying on one system, and how it can be used by attackers to gain access to your valuable information and data. Defence in Depth (DiD) is [...]

Disaster Masterclass at Williams F1:  What you missed…

Disaster Masterclass at Williams F1: What you missed…

Our Disaster Masterclass finale event took place at the Williams F1 Conference Centre. Check out our previous blogs Blenheim Palace: Disaster Masterclass Windsor Castle Hotel: Disaster Masterclass We explored the importance of PR communication. How to best handle comms if a crisis occurs, and what to do and say to avoid the pivotal moment of [...]

Disaster Masterclass at Blenheim Palace: What you missed…

Disaster Masterclass at Blenheim Palace: What you missed…

The first of our three exciting Disaster Masterclass events took place at Blenheim Palace last week. We had some amazing speakers from organisations such as Datto and Microsoft (Vuzion). They spoke about the importance of preparing your business against a business disaster! The threat landscape Cybercrime and cyber-fraud is at an all-time-high and will only [...]

Why Business Continuity and Disaster Recovery is Vital

Why Business Continuity and Disaster Recovery is Vital

Business Continuity and Disaster Recovery (BCDR) is vital. DRBC is the overall process of reducing the likelihood and impact of a disaster on a business. It is a key component for business viability. Business Continuity is the operations side of BCDR. For example, designing and creating policies or procedures that help essential business function during [...]

The Cyber Risks of Working From Home

The Cyber Risks of Working From Home

The Cyber Risks of Working From Home : As I’m sure everyone knows, home working has become more popular than ever before and this is great. It allows for more flexibility, saves time and money. It also boosts job satisfaction and work-life balance. That being said, in order to fully harness these benefits – and keep [...]

Why you need to turn MFA on

Why you need to turn MFA on

Did you realise that a 6-character password, containing upper- and lower-case letters, numbers and symbols can be broken into more quickly than you can type it? Hackers can easily access passwords these days, so it's important to implement multi-factor authentication (MFA) to safeguard your business' finances. This MFA approach helps protect your bank accounts and [...]

Disaster Masterclass: Preparing for 2022

Disaster Masterclass: Preparing for 2022

We had an incredible Disaster Masterclass: preparing for 2022 event in partnership with Thames Valley Chamber of Commerce. If you missed the event here is a quick recap video from this engaging session. Takeaway top tips from the presenters at the event: Greg Jones. Datto. Cyber-crime has overtaken crime in the real world – don’t ignore [...]

5 Common Types of Phishing Attacks

5 Common Types of Phishing Attacks

How to protect you and your business Be aware of the 5 common types of phishing attacks: protecting yourself and your business is key. It's important to create systems that ensure you are secure and that your operations are stable. It is essential to be aware of the latest threats and have measures in place [...]

Eliminating the threat of Shadow IT

Eliminating the threat of Shadow IT

Eliminating the threat of Shadow IT has never been more important. While your employees will largely recognise the importance of IT, there will be an underlining trend where employees take some elements of IT into their own hands. These few will use their own devices, apps and software for business use, without IT's approval — [...]

Do you fire-drill your servers and IT systems?

Do you fire-drill your servers and IT systems?

All businesses run fire-drills at our places of work – but do you fire-drill your servers and IT systems? The truth is you’re more likely to suffer a cyber security attack than suffer from a fire? So why don’t businesses regularly run recovery drills? Downtime is expensive, but just how expensive? Everyone knows that I.T. downtime [...]

How secure is your Human Firewall?

How secure is your Human Firewall?

How secure is your Human Firewall? You may have heard of the term the 'Human Firewall', it's a bit of a buzzword at the moment, but what does it mean? Hackers are getting more sophisticated and are deliberately targeting the weakest link in your security, your team. Those human gatekeepers of an organisation’s safety. Your [...]

Law firms – Why you shouldn’t let your unused domain names expire

Law firms – Why you shouldn’t let your unused domain names expire

Securing law firm domain names is critical. Criminals are targeting UK law firms because of the data they hold and the sheer volume of high-value transactions that go through them every month. In April 2019 there were over 70,000* property transactions in the UK, with the average UK house price for the same month coming [...]

NCSC Cyber Essentials Certification

NCSC Cyber Essentials Certification

Cyber Essentials, for us it's... essential. We’re pleased to announce that we have gained our Cyber Essential status, within the UK Government’s National Cyber Security Centre (NCSC) framework. The requirements for our IT infrastructure – within this framework – cover five core technical principles; these are: Firewall protection Security configuration User access control management Malware [...]

Where’s my email gone? part 1

Where’s my email gone? part 1

Protect PART 1 of 2 So, emails. You’ve probably sent a handful today already, from your phone or computer, and will undoubtedly send plenty more throughout the day. In business we use them as a way of staying in touch with multiple stakeholders, running projects and keeping on top of our work. If you’ve ever [...]

Where’s my email gone? Part 2

Where’s my email gone? Part 2

Keep it safe 'Dave' PART 2 of 2 At some point in time you may need to restore some data. Depending on what level of backup you have, you can go as far as restoring one single email that Dave in accounts sent you about your expenses being approved - or an entire inbox. The [...]

How claireLOGIC supported Oakey Automotive Services fight-off the hackers

How claireLOGIC supported Oakey Automotive Services fight-off the hackers

Oakey’s are a car and van repair garage based in Oxfordshire. They were established in the early 80’s and now deliver specialist diesel vehicle repairs, servicing and MOT testing – the business has also recently expanded their range of offerings to include Motorhomes and caravan repairs and habitation servicing. Overview The business has a varied [...]

Why should you protect your business from ransomware attacks?

Why should you protect your business from ransomware attacks?

In a recent survey, 99% of Managed Service Providers (MSPs) predict significant increases in ransomware attacks over the next 2 years. The report was conducted by our disaster recovery partner Datto – who surveyed 1,700+ MSPs that serve 100,000+ small-to-mid-sized businesses globally. They found that ransomware attacks have soared in recent years, with nearly all [...]

What is Social Engineering and what does it mean to your business?

What is Social Engineering and what does it mean to your business?

Cyber social engineering scams have been around for more than a decade and yet people continue to fall for them every day. Down to a lack of awareness and basic cyber security training, people fall for the same tricks every day. Unfortunately, the weakest link in your cyber security is also usually your greatest asset [...]

IoT Security

IoT Security

IoT Security – handy tips to keep you and your 'things' safe... So, if you’re either one of your parents, or getting older before your time, in fact, if you’re not a Millennial, you probably find yourself saying, “well isn’t that clever” or, “what will they think of next”, a couple of times a week. OK, [...]

Don’t get stung by fake Microsoft and BT scammers

Don’t get stung by fake Microsoft and BT scammers

We are receiving a steady increase of support calls from clients who are falling foul of fake support calls – scammers pretending to be from either Microsoft, BT or your bank! Don't be stung by fake scammers. This activity has been ongoing for many years – however, the scammers are upping-their-game; and targeting more users, [...]

Cyber security: Understand the threat to your business

Cyber security: Understand the threat to your business

Right now, a business is being attacked. And while the criminals behind the attack might never be identified, they’re absolutely professional in their approach – and they can cost you a fortune and your credibility. Last year alone, 17 million British people were victims of cyber crime, yet incredibly, not everyone gives cyber security the consideration [...]

What is layered security and why do you need it?

What is layered security and why do you need it?

Protecting your IT systems is so important, especially with data laws being fortified through GDPR and regular news updates circulating around malware and viruses almost becoming the daily norm. Most companies and charities now have a certain level of IT protection in place, but is your security “layered”? About layered security Layered security involves multiple [...]

Is someone watching you through your TV?

Is someone watching you through your TV?

Many of us may welcome new smart gadgets and devices into our homes. They might have an impressive touchscreen or a smartphone app that allows you to control them from wherever you are, whenever – making life a little bit more fun (if that’s your kind of thing) and easier than before. Yet behind the [...]

Dangerous vault app for children – hidden on their phone

Dangerous vault app for children – hidden on their phone

It’s not always easy to spot a dangerous app for children. You might think you check your child’s phone often enough and it all looks above board. Sometimes, however, not everything is as your child or teenager would have you believe. App creators have identified that most children or teens like to keep secrets from [...]

Fed up with online ads? Not for much longer

Fed up with online ads? Not for much longer

Earlier in the year Google announced it was going to be imposing greater restrictions on online advertising, making browsing far easier and far less annoying for some of us. Google makes huge amounts of revenue from its very own online advertising, however, so how is this going to work? Currently, Google pays fees to third-party [...]

“WannaCry” ransomware. The scale of the attack has been huge.

“WannaCry” ransomware. The scale of the attack has been huge.

We're sure you’ve seen media coverage over the weekend of the “WannaCry” ransomware attack. The scale of the attack has been huge. What happened? Several large organisations were hit by a ransomware attack. This is where a computer gets infected with a certain type of virus. Once infected the virus searches the computer and network [...]

Increase your IT security with mobile antivirus

Increase your IT security with mobile antivirus

Most people today own a smartphone but are woefully negligent when it comes to mobile security. With some simple steps, you can stay ahead of the hackers and keep your data protected. Almost everyone who owns computer hardware understands the importance of antivirus software. Every year, businesses and consumers spend millions of pounds protecting their [...]

Do you use the same password for everything?

Do you use the same password for everything?

We’ve all been there. It’s just so easy to use the same login and password details across multiple websites. Yet we know it’s not the right or sensible thing to do. So if you make one New Year’s Resolution for 2017 make it this: to vary your logins and passwords before your accounts get hacked [...]

Outsourcing your IT – Threats within your organisation

Outsourcing your IT – Threats within your organisation

Would you like to keep your business IT systems safe from hackers? Of course, you do! But what about threats from within? Would outsourcing your IT help? In many cases, small businesses appoint an internal IT person who is then granted access to sensitive information such as financial data, email addresses and passwords. In organisations [...]

We regularly share informative content on the latest trends, best practice and things to watch out for…

Want to be one of the first to read our blogs? Get them straight to your inbox.

claireLOGIC

Our company

  • Why claireLOGIC?
  • Meet the Team
  • Our partners
  • About us

Talk to us

  • Book an appointment
  • Recruitment
  • Contact us

Useful places

  • Resource Centre
  • HR Solutions
  • Get support

  • Privacy Policy

© 2023 claireLOGIC Ltd