<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Antivirus Archives &#8211; IT Support Services in Huddersfield, Yorkshire</title>
	<atom:link href="https://www.probado.co.uk/category/antivirus/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.probado.co.uk/category/antivirus/</link>
	<description></description>
	<lastBuildDate>Fri, 18 Dec 2020 17:57:50 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://www.probado.co.uk/wp-content/uploads/2017/10/favicon-1.png</url>
	<title>Antivirus Archives &#8211; IT Support Services in Huddersfield, Yorkshire</title>
	<link>https://www.probado.co.uk/category/antivirus/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to winter-proof your IT system</title>
		<link>https://www.probado.co.uk/winter-proof-your-it-system/</link>
					<comments>https://www.probado.co.uk/winter-proof-your-it-system/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Fri, 18 Dec 2020 17:57:50 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Back up Files]]></category>
		<category><![CDATA[Cloud Storage]]></category>
		<category><![CDATA[Data Centre]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[VoIP]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[IT System]]></category>
		<category><![CDATA[Winter]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2906</guid>

					<description><![CDATA[<p>Winter can be bleak, full of dark nights and cold weather, but you&#8217;re IT doesn’t need to suffer. Here are our top tips for winter-proofing your IT system. Gone with the wind VoIP works via the internet and is a fantastic option for those looking to future-proof</p>
<p>The post <a href="https://www.probado.co.uk/winter-proof-your-it-system/">How to winter-proof your IT system</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-2905" src="https://www.probado.co.uk/wp-content/uploads/2020/12/Snow.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2020/12/Snow.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2020/12/Snow-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2020/12/Snow-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2020/12/Snow-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2020/12/Snow-1536x925.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2020/12/Snow-2048x1233.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2020/12/Snow-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2020/12/Snow-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2020/12/Snow-190x114.jpg 190w" sizes="(max-width: 2492px) 100vw, 2492px" /><br />
Winter can be bleak, full of dark nights and cold weather, but you&#8217;re IT doesn’t need to suffer. Here are our top tips for winter-proofing your IT system.</p>
<h2>Gone with the wind</h2>
<p>VoIP works via the internet and is a fantastic option for those looking to future-proof their systems. VoIP also lends itself to <a href="https://www.probado.co.uk/5-remote-working-tips/">remote working</a> as there is no need for arduous installation or hardware. The phones can simply be plugged into a router and are good to go.</p>
<p>When it comes to extreme weather, if you’re leaving the office for a period of time, move all tech equipment and wires off the floor. Should the worst happen and water gets into your office, your tech will be out of harm’s way.</p>
<h2>Location, location, location</h2>
<p>When it comes to storing your devices, if you’re packing away the laptop in exchange for your kitchen table back, be mindful of where you relocate devices to. Don’t leave them in a damp or particularly cold area as this could cause damage to the screen or hard drive. If a laptop has been left in the cold for any period of time, when you bring it back to a warmer environment, be sure to give it time to come to room temperature first. The rapid change in temperature can cause condensation which may lead to electrical problems.</p>
<p>If you’re on the go, try and avoid keeping devices in the car for a long period of time. Not only does this increase the likelihood of them being stolen if spotted though the window, but extended exposure to moisture can cause damage to your screens, especially any with touch screens features.</p>
<p>If you do have to leave them in the car or a colder environment, make sure they’re bundled up and not able to slide around.</p>
<h2>Back it up</h2>
<p>It’s good practice to back up all your files and data. Make sure this is done before you log off for the festive period. It won’t be a happy New Year if you come back to the office and can’t access your files!</p>
<p><a href="https://www.probado.co.uk/what-are-data-centres/">Data centres</a> are a brilliant option as they are always up to date with antivirus software and firewalls, as well as having top physical security to ensure your data is safe and sound and protected from storms and break ins.</p>
<p><a href="https://www.probado.co.uk/on-premise-vs-cloud-storage/">Cloud storage</a> is another great option and aids those who will working remotely this winter. Users simply need to login and they can access their data from anywhere in the world at any time of day.</p>
<p>There are simple things you can do to winter-proof your IT, whether that be storing your devices safely or making sure your antivirus is up to date.</p>
<p>If you’re unsure about anything or would like some advice on how to keep your IT safe this winter, get in touch with a member of the team via <a href="mailto:info@probado.co.uk">info@probado.co.uk</a> or give us a call on 01484 905103.</p>
<p>The post <a href="https://www.probado.co.uk/winter-proof-your-it-system/">How to winter-proof your IT system</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/winter-proof-your-it-system/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Spooky Stories: Horror Stories from the World of IT</title>
		<link>https://www.probado.co.uk/spooky-stories/</link>
					<comments>https://www.probado.co.uk/spooky-stories/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Thu, 22 Oct 2020 10:29:59 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[World of IT]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2855</guid>

					<description><![CDATA[<p>It’s almost that time of year, pumpkins are being carved, costumes are being bought for (virtual) parties, and we’re stocking up on sweet treats. But be wary, you never know what horrors are lurking around the corner, or in your computer! We’ve rounded up some spooky stories</p>
<p>The post <a href="https://www.probado.co.uk/spooky-stories/">Spooky Stories: Horror Stories from the World of IT</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="aligncenter size-full wp-image-2854" src="https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-1536x925.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-2048x1233.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-190x114.jpg 190w" sizes="(max-width: 2492px) 100vw, 2492px" /><br />
It’s almost that time of year, pumpkins are being carved, costumes are being bought for (virtual) parties, and we’re stocking up on sweet treats. But be wary, you never know what horrors are lurking around the corner, or in your computer! We’ve rounded up some spooky stories from the world of IT.</p>
<h2>Invisable Attacker</h2>
<p>In a phishing scam, described by cyber security expert and bug bounty hunter, Craig Hays as the greatest password theft he’s ever seen, the culprit was somehow able to fly under the radar, undetected even by the experts. In a blog for <a href="https://medium.com/swlh/phishing-with-worms-the-greatest-password-theft-ive-ever-seen-26d6ad4658f9">Medium.com</a>, Craig explained: “A typical phishing email comes from an email address you’ve never seen before. In this attack, however, all of the phishing links were sent as replies to emails in the compromised account’s mailbox. This gave every email an inherited sense of trust.”</p>
<p>The attacker used established email trails and trusted email addresses to trick victims into clicking. The original, legitimate email thread was maintained, also using the ‘reply all’ option to ensure everybody who was involved continued to receive the messages. This disguise within a legitimate conversation allowed the hacker to reply unnoticed and become part of an existing conversation.</p>
<p>So, how did Craig stop it? “We identified a pattern in the URL of the phishing pages being linked to which we could use to block them. Then we promptly rolled out Multi-Factor Authentication to anyone who didn’t have it.”</p>
<p><a href="https://www.probado.co.uk/password-security-for-smes/">Multi-factor authentication</a> (MFA) is a vital tool to help defend against cybercriminals, this can include factors such as pin codes, biometrics or card readers, in addition to a password.</p>
<h2>Hollywood Horrors</h2>
<p>In the world of IT, even famous figures are not untouchable. McAfee revealed that a group of celebrities were being used as bait for some dangerous cyberattacks. The <a href="https://www.dailymail.co.uk/sciencetech/article-8808985/Graham-Norton-named-dangerous-celebrity-search-online-UK.html">security firm’s research</a> found that searches for big names including Ricky Gervais, Ruth Jones, and Tom Hardy were to blame for leading people to suspicious sites. Graham Norton’s name was found to be the most likely term used by hackers to lure people into clicking on unsafe sites and potentially harmful pages.</p>
<p>McAfee fellow, Raj Samani said: “&#8217;We know that online criminals use consumers’ fascination with celebrity culture to drive unsuspecting fans to malicious websites that install malware on their devices. As cybercriminals continue to implement deceptive practices such as fake sites claiming to offer free content, it is crucial that fans stay vigilant about protecting their digital lives and think twice before clicking.”</p>
<h2>Scary Speakers</h2>
<p>Smart speakers and other devices are now <a href="https://www.probado.co.uk/internet-of-things/">commonplace in the home</a>, but are they getting a little too comfortable? Back in 2018, Amazon received numerous reports that their Alexa smart speakers were laughing at random times, completely unprompted. The scary chuckle was freaking out users across the world. Amazon has since explained that the device was mishearing what it believed to be the command, ‘Alexa, laugh’ and acting on that. The company has since reprogrammed the speakers to respond to the phrase, ‘Alexa, can you laugh?’ a clearer command with less chance of being misinterpreted.</p>
<p>An <a href="https://www.theverge.com/circuitbreaker/2018/3/7/17092334/amazon-alexa-devices-strange-laughter">Amazon spokesperson</a> said: “We are also changing Alexa’s response from simply laughter to ‘sure, I can laugh’ followed by laughter.”</p>
<p>We hope these spooky stories from the world of IT have got you in the Halloween mood, but remember there is a moral to every story. Whether that be to enable Multi-Factor Authentication or to be wary of inviting robots into your home, our team is here to help with any scary IT issues that may arise, get in <a href="https://www.probado.co.uk/contact-probado/">touch here</a>.</p>
<p>The post <a href="https://www.probado.co.uk/spooky-stories/">Spooky Stories: Horror Stories from the World of IT</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/spooky-stories/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to avoid manufacturing cyber security risks</title>
		<link>https://www.probado.co.uk/manufacturing-cyber-security-risks/</link>
					<comments>https://www.probado.co.uk/manufacturing-cyber-security-risks/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Wed, 01 Apr 2020 13:58:35 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Firewalls]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[Cyber security risks]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2681</guid>

					<description><![CDATA[<p>All manufacturers want to protect their equipment, employees and customers from cyber security risks, but what is the best way? The reality is there is no secret formula to ensure safety but there are ways to better the odds. Here are the top things to consider when</p>
<p>The post <a href="https://www.probado.co.uk/manufacturing-cyber-security-risks/">How to avoid manufacturing cyber security risks</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="aligncenter size-full wp-image-2679" src="https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot-1536x925.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot-2048x1233.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot-190x114.jpg 190w" sizes="(max-width: 2492px) 100vw, 2492px" /><br />
All manufacturers want to protect their equipment, employees and customers from cyber security risks, but what is the best way? The reality is there is no secret formula to ensure safety but there are ways to better the odds. Here are the top things to consider when looking at how to avoid manufacturing cyber security threats and stay as safe as possible.</p>
<h2>1. Training</h2>
<p>Training is vital for all staff. You wouldn’t send a footballer on to the pitch with no knowledge of the game, so why would you allow employees to use computers and computerised equipment without basic cyber security training?</p>
<p>Whether staff are using an email account or operating a complex piece of machinery, training them to be able to identify suspicious activity and report it to the correct member of staff could save your business thousands or even millions. Consider the long-term impact a breech might have on your hard-earned brand the potential impact in your supply chain(s).</p>
<h2>2. Antivirus and firewalls</h2>
<p>It may seem like a simple step but ensuring you have antivirus software and firewalls installed across your network is one of the best (and easiest) ways to protect your business from a cyber-attack. Such software can be deployed from across the entire network with ease, a small price to pay.</p>
<p>Ensure all your antivirus software (as well as other general apps and programmes) are updated as and when required. We know those update pop-ups can be irritating, however, ignoring them could come at a huge risk. Updates are there to plug holes and improve performance. If a programme, device or application is not updated when required it could leave a gap for hackers and other cyber criminals to access your network.</p>
<p>Make sure all updates are done as soon as they can be and auto enable them where possible.</p>
<h2>3. Access and passwords</h2>
<p>Only give access where necessary, it is not a matter of trust, if someone’s login gets comprised, cybercriminals could potentially gain access to the entire network. Only give staff access to server areas, equipment and files that they need to do their jobs properly. Additional access can be granted at a further date but restricting access where it isn’t needed is a great start to minimise risk.</p>
<p>Physical access also benefits from being restricted. If everyone on site has a master key to all areas, should one get lost or into the wrong hands the entire facility is at risk. Be mindful when granting access, again this can always be modified at a later date should an employee’s requirements and remits change.</p>
<p>Having strong passwords is key, not just for manufacturers but for everyday life. Avoid using the same passwords for multiple accounts as well as easy to guess passwords such as ‘password’ or ‘12345’. Implementing multi-factor authentication (MFA) is also a good option. MFA grants access after two or more ‘factors’ are fulfilled. Some common MFA factors are:</p>
<p>• Password<br />
• Additional pin number<br />
• Fingerprint<br />
• Additional device or key<br />
• Voice recognition</p>
<h2>4. New technologies</h2>
<p>Another step to take to prevent any cyber security risks is by ensuring your Wi-Fi connection is secure is essential. This is not just for emails and browsing on the web, with many manufacturers now implementing internet of things (IoT) technologies into their processes, internet security is more important than ever.</p>
<p>A joint Ponemon Institute and Shared Assessments report showed that less than 20% of risk professionals could identify all IoT devices within their organisations. Ensure your IT team is aware of any new devices, however big or small. Think of it this way, if it has an internet connection, it can be hacked or manipulated.</p>
<h2>5. Supply chain</h2>
<p>If you work within a supply chain, then you definitely need to bear in mind the security of each business in the chain. While the majority may be on top of their security, if one is lacking then they pose a risk to all in the network. A supply chain is only as strong as its weakest link.</p>
<p>Supply chains are becoming increasingly desirable to cyber criminals as there are ultimately more users and data to target. There are however some simple steps businesses can take to minimise the risk:</p>
<p>• Perform a cyber risk audit at the beginning of new business relationships.<br />
• Conduct regular reviews of everyone’s cyber security.<br />
• If you notice a risk or area of weakness, inform other businesses as a matter of urgency.<br />
• If your business experiences a breach, notify all parties in the supply chain as soon as possible.</p>
<p>For more information on how to protect your manufacturing business from cyber risks, get in touch with our team here.</p>
<p>The post <a href="https://www.probado.co.uk/manufacturing-cyber-security-risks/">How to avoid manufacturing cyber security risks</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/manufacturing-cyber-security-risks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
