<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber-attacks Archives &#8211; IT Support Services in Huddersfield, Yorkshire</title>
	<atom:link href="https://www.probado.co.uk/category/cyber-attacks/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.probado.co.uk/category/cyber-attacks/</link>
	<description></description>
	<lastBuildDate>Thu, 22 Oct 2020 15:01:35 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://www.probado.co.uk/wp-content/uploads/2017/10/favicon-1.png</url>
	<title>Cyber-attacks Archives &#8211; IT Support Services in Huddersfield, Yorkshire</title>
	<link>https://www.probado.co.uk/category/cyber-attacks/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Spooky Stories: Horror Stories from the World of IT</title>
		<link>https://www.probado.co.uk/spooky-stories/</link>
					<comments>https://www.probado.co.uk/spooky-stories/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Thu, 22 Oct 2020 10:29:59 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[World of IT]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2855</guid>

					<description><![CDATA[<p>It’s almost that time of year, pumpkins are being carved, costumes are being bought for (virtual) parties, and we’re stocking up on sweet treats. But be wary, you never know what horrors are lurking around the corner, or in your computer! We’ve rounded up some spooky stories</p>
<p>The post <a href="https://www.probado.co.uk/spooky-stories/">Spooky Stories: Horror Stories from the World of IT</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-2854" src="https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-1536x925.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-2048x1233.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-190x114.jpg 190w" sizes="(max-width: 2492px) 100vw, 2492px" /><br />
It’s almost that time of year, pumpkins are being carved, costumes are being bought for (virtual) parties, and we’re stocking up on sweet treats. But be wary, you never know what horrors are lurking around the corner, or in your computer! We’ve rounded up some spooky stories from the world of IT.</p>
<h2>Invisable Attacker</h2>
<p>In a phishing scam, described by cyber security expert and bug bounty hunter, Craig Hays as the greatest password theft he’s ever seen, the culprit was somehow able to fly under the radar, undetected even by the experts. In a blog for <a href="https://medium.com/swlh/phishing-with-worms-the-greatest-password-theft-ive-ever-seen-26d6ad4658f9">Medium.com</a>, Craig explained: “A typical phishing email comes from an email address you’ve never seen before. In this attack, however, all of the phishing links were sent as replies to emails in the compromised account’s mailbox. This gave every email an inherited sense of trust.”</p>
<p>The attacker used established email trails and trusted email addresses to trick victims into clicking. The original, legitimate email thread was maintained, also using the ‘reply all’ option to ensure everybody who was involved continued to receive the messages. This disguise within a legitimate conversation allowed the hacker to reply unnoticed and become part of an existing conversation.</p>
<p>So, how did Craig stop it? “We identified a pattern in the URL of the phishing pages being linked to which we could use to block them. Then we promptly rolled out Multi-Factor Authentication to anyone who didn’t have it.”</p>
<p><a href="https://www.probado.co.uk/password-security-for-smes/">Multi-factor authentication</a> (MFA) is a vital tool to help defend against cybercriminals, this can include factors such as pin codes, biometrics or card readers, in addition to a password.</p>
<h2>Hollywood Horrors</h2>
<p>In the world of IT, even famous figures are not untouchable. McAfee revealed that a group of celebrities were being used as bait for some dangerous cyberattacks. The <a href="https://www.dailymail.co.uk/sciencetech/article-8808985/Graham-Norton-named-dangerous-celebrity-search-online-UK.html">security firm’s research</a> found that searches for big names including Ricky Gervais, Ruth Jones, and Tom Hardy were to blame for leading people to suspicious sites. Graham Norton’s name was found to be the most likely term used by hackers to lure people into clicking on unsafe sites and potentially harmful pages.</p>
<p>McAfee fellow, Raj Samani said: “&#8217;We know that online criminals use consumers’ fascination with celebrity culture to drive unsuspecting fans to malicious websites that install malware on their devices. As cybercriminals continue to implement deceptive practices such as fake sites claiming to offer free content, it is crucial that fans stay vigilant about protecting their digital lives and think twice before clicking.”</p>
<h2>Scary Speakers</h2>
<p>Smart speakers and other devices are now <a href="https://www.probado.co.uk/internet-of-things/">commonplace in the home</a>, but are they getting a little too comfortable? Back in 2018, Amazon received numerous reports that their Alexa smart speakers were laughing at random times, completely unprompted. The scary chuckle was freaking out users across the world. Amazon has since explained that the device was mishearing what it believed to be the command, ‘Alexa, laugh’ and acting on that. The company has since reprogrammed the speakers to respond to the phrase, ‘Alexa, can you laugh?’ a clearer command with less chance of being misinterpreted.</p>
<p>An <a href="https://www.theverge.com/circuitbreaker/2018/3/7/17092334/amazon-alexa-devices-strange-laughter">Amazon spokesperson</a> said: “We are also changing Alexa’s response from simply laughter to ‘sure, I can laugh’ followed by laughter.”</p>
<p>We hope these spooky stories from the world of IT have got you in the Halloween mood, but remember there is a moral to every story. Whether that be to enable Multi-Factor Authentication or to be wary of inviting robots into your home, our team is here to help with any scary IT issues that may arise, get in <a href="https://www.probado.co.uk/contact-probado/">touch here</a>.</p>
<p>The post <a href="https://www.probado.co.uk/spooky-stories/">Spooky Stories: Horror Stories from the World of IT</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/spooky-stories/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Top five cyber security tips for manufacturers</title>
		<link>https://www.probado.co.uk/manufacturing-cyber-tips/</link>
					<comments>https://www.probado.co.uk/manufacturing-cyber-tips/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Fri, 25 Sep 2020 09:29:18 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[Manufacturing]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2840</guid>

					<description><![CDATA[<p>The manufacturing industry has seen a myriad of exciting tech developments in the last few years, helping to aid productivity, efficiency, and the overall capabilities of a business. But all this new tech can cause cyber security concerns to arise. Manufacturing continues to be a target for</p>
<p>The post <a href="https://www.probado.co.uk/manufacturing-cyber-tips/">Top five cyber security tips for manufacturers</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="aligncenter size-full wp-image-2842" src="https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1-1536x925.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1-2048x1233.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1-190x114.jpg 190w" sizes="(max-width: 2492px) 100vw, 2492px" /></p>
<p>The manufacturing industry has seen a myriad of exciting tech developments in the last few years, helping to aid productivity, efficiency, and the overall capabilities of a business. But all this new tech can cause cyber security concerns to arise.</p>
<p>Manufacturing continues to be a target for cyber-attackers, and with <a href="https://www.makeuk.org/insights/reports/cyber-security-for-manufacturing">45% of manufacturers</a> feeling like they don’t have access to the right tools to protect themselves from a cyber-attack, it is now more important than ever that manufacturers put procedures in place. We’ve rounded up our top five manufacturing cyber tips to help keep your business as cyber safe as possible.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-2843" src="https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph.jpg" alt="" width="2492" height="1717" srcset="https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph-300x207.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph-1024x706.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph-768x529.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph-1536x1058.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph-2048x1411.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph-160x110.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph-87x60.jpg 87w, https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph-190x131.jpg 190w" sizes="(max-width: 2492px) 100vw, 2492px" /></p>
<p><a href="https://cerasis.com/manufacturing-and-cyber-security/">Source: Cerasis</a></p>
<h2>1. Ensure All Employees Have Cyber Security Training</h2>
<p>It is vital that all members within your team receive regular cyber security training. When dealing with high tech equipment on a daily basis, it is crucial that employees are comfortable using certain tech and can identify and report any cyber security concerns quickly and efficiently. Being familiar with the technology and operating systems that are being used will ensure anything out of the ordinary can be flagged and dealt with in the correct way.</p>
<h2>2. Update Your Protection Software</h2>
<p>While it may seem obvious to install antivirus programmes, it is vital that all internet connected devices within a network are protected. Make sure antivirus software and intrusion detection software are <a href="https://www.probado.co.uk/security-and-software-updates/">regularly updated</a> and deployed across your network. Automate this process where possible to make sure updates are done as soon as possible. It is important that any updates are done quickly as these will plug any holes or fix any errors that have been found.</p>
<h2>3. Don’t Forget Your IIOT</h2>
<p>Industrial Internet of Things (IIOT) technologies are becoming commonplace in most UK manufacturing businesses. Whether you’ve got large pieces of machinery, connected sensors, or personal protection wearable devices, they all must be protected. These devices can often be forgotten when considering cyber security. We suggest adopting the mindset of if it’s got an internet connection, it can be hacked and therefore needs protecting!</p>
<h2>4. Back Up Key Data and Programmes</h2>
<p>In the event that a breach or error should occur, it is important that all files, data, and operating programmes are backed up and able to be recovered. In the manufacturing industry, data loss can bring your business to a halt, causing expensive downtime. Making sure everything is backed up and accessible should the worst happen could save a lot of time and money. We suggest you consider opting for an <a href="https://www.probado.co.uk/what-are-data-centres/">external data centre</a>, these can be managed by an expert company and can keep your data safe should your network be accessed.</p>
<h2>5. Think Like a Hackers</h2>
<p>When it comes to manufacturing cyber tips, we recommend putting yourself in the shoes of a hacker. This may sound strange, but the best way to protect yourself from a hacker is to understand their motivations. Look at your business and identify any key areas, devices, or assets that would be of interest to a hacker. Cybercriminals are generally inspired by financial gains, so any data containing personal information, customer records, or actual cash is what they’ll be after. We recommend setting up <a href="https://www.probado.co.uk/password-security-for-smes/">multi-factor authentication</a> as well as restricting access to just those employees who require it. These actions will help limit the opportunities for accessing valuable data and add an extra layer of protection.</p>
<p>Here at Probado, we regularly work with manufacturers to ensure their systems are safe and can operate at the highest level <a href="https://www.probado.co.uk/cyber-security-across-multiple-sites/">across all sites</a>. For more manufacturing cyber tips, check out our blog on <a href="https://www.probado.co.uk/manufacturing-cyber-security-risks/">how to avoid manufacturing security risks</a>.</p>
<p>The post <a href="https://www.probado.co.uk/manufacturing-cyber-tips/">Top five cyber security tips for manufacturers</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/manufacturing-cyber-tips/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>A guide to ethical hacking</title>
		<link>https://www.probado.co.uk/guide-to-ethical-hacking/</link>
					<comments>https://www.probado.co.uk/guide-to-ethical-hacking/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Mon, 13 Jul 2020 13:57:46 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[Ethical hacking]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2771</guid>

					<description><![CDATA[<p>The term ‘hacking’ is often associated with cybercriminals and those who will take advantage of your every click. However, there is a type of hacker that can be your friend and will help protect you and your business. This practice is called ethical hacking. Big brands, including</p>
<p>The post <a href="https://www.probado.co.uk/guide-to-ethical-hacking/">A guide to ethical hacking</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-2769" src="https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500-1536x925.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500-2048x1233.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500-190x114.jpg 190w" sizes="auto, (max-width: 2492px) 100vw, 2492px" /><br />
The term ‘hacking’ is often associated with cybercriminals and those who will take advantage of your every click. However, there is a type of hacker that can be your friend and will help protect you and your business. This practice is called ethical hacking. Big brands, including Facebook, employ ethical hackers to help keep them safe. But just what is ethical hacking, and can your business benefit?</p>
<h2>Spot the difference</h2>
<p>While they sound similar and are both practices using the same techniques, ethical and unethical hacking should not be confused. An ethical hacker is legitimately hacking your system to find any issues or areas of weakness. Unethical hackers are hacking your system to cause trouble, steal data and/or information or to try and extort funds from your business. The use of ethical hacking can actually prevent unethical hackers from gaining access to your network and devices.</p>
<p>A common misconception with ethical hacking is the legality behind it, many individuals believe that hacking of all types is an illegal practice. However, that is not the case. Ethical hacking is perfectly legal. <a href="https://www.itgovernance.co.uk/ethical-hacking">IT Governance</a> explains that ethical hackers ‘have the same knowledge and tools as a criminal hacker, but their work is conducted in a lawful manner’.</p>
<h2>Why do it?</h2>
<p>It may sound counterproductive, employing people to hack your business. However, this can be a crucial defence mechanism in protecting your business. Ethical hackers will notify you of any weak spots, unprotected areas, or easy ways that malicious hackers can take advantage of and gain access to your network. This will allow you to patch these holes and add technical armour to any areas of weakness before a product goes to market or a system into use. Ethical hacking does what it says on the tin, it is the practice of hacking systems and devices in an ethical manner. It can also be referred to as <a href="https://www.probado.co.uk/cyber-security-jargon/">penetration testing</a>, trying to penetrate a system to test its defences.</p>
<p>Ethical hacking has been around since the early days of the internet. According to <a href="https://medium.com/@TheFarmanShekh/examples-of-ethical-hacking-how-hacking-can-improve-our-lives-fbf6ec1c9b1d#:~:text=The%20practice%20of%20breaking%20into,to%20discover%20its%20weak%20points">Medium.com</a>, the United States Air Force used ethical hacking procedures to evaluate the security of an operating system which unearthed some vulnerable software and hardware. This then allowed them to fix the problem before the system was put into use.</p>
<h2>Covering all bases</h2>
<p>When engaging an ethical hacker, it is important that you have a clear brief. Be sure to specify which devices you wish to be tested or if it is the full network. We recommend testing the entire network, your individual devices may be secure but when operating with a company-wide network it is vital that all devices, systems, and applications are safe. Your business is only as strong as your weakest device or system.</p>
<p>If that still sounds too good to be true, check out Packt’s examples of successful ethical hacking missions <a href="https://hub.packtpub.com/10-times-ethical-hackers-spotted-a-software-vulnerability-and-averted-a-crisis/">here</a>.</p>
<p>If you have any questions, please <a href="https://www.probado.co.uk/contact-probado/">get in touch</a> with a member of our team.</p>
<p>The post <a href="https://www.probado.co.uk/guide-to-ethical-hacking/">A guide to ethical hacking</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/guide-to-ethical-hacking/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Keeping data secure when working from home</title>
		<link>https://www.probado.co.uk/keeping-data-secure-working-from-home/</link>
					<comments>https://www.probado.co.uk/keeping-data-secure-working-from-home/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Thu, 02 Jul 2020 17:00:21 +0000</pubDate>
				<category><![CDATA[Coronavirus]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Passwords]]></category>
		<category><![CDATA[Remote Working]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[Keeping data secure]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2759</guid>

					<description><![CDATA[<p>Keeping data secure is one of the main concerns companies and individuals are faced with when working remotely. With almost 50% of the population now working from home, it is essential that security programs and policies are both capable enough and sustainable enough to ensure that data</p>
<p>The post <a href="https://www.probado.co.uk/keeping-data-secure-working-from-home/">Keeping data secure when working from home</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-2741" src="https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops-1536x925.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops-2048x1233.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops-190x114.jpg 190w" sizes="auto, (max-width: 2492px) 100vw, 2492px" /><br />
Keeping data secure is one of the main concerns companies and individuals are faced with when working remotely. With almost 50% of the population now working from home, it is essential that security programs and policies are both capable enough and sustainable enough to ensure that data remains safe. Even following a return to normal working conditions, lots of companies may use the success of home working during lockdown to implement a more flexible and accessible remote working policy going forward.</p>
<p>While it is vital that we are keeping data secure throughout the pandemic, it is an ongoing necessity. Ensuring that remote working is as safe as can be for both employees and companies is essential to implementing successful remote working strategies both now and in the future.</p>
<p>For those who have already adopted remote working, robust data security policies may already be in place. However, many companies have not worked this way before, at least not on this scale, or may have only just begun to dip their toes into the remote working pool, meaning that their security best practices may still be in the initial phases of development.</p>
<p>The main thing to consider when taking operations remotely, in any scenario, is training. The key to keeping data secure is ensuring all employees are comfortable with the systems they are using, they understand the importance of security measures and best practices, are able to spot anything that may be suspicious or out of the ordinary, and know how to report or solve any problems that arise.</p>
<p>When employees are out of the office it is vital that they feel comfortable with these processes without the immediate, on-site assistance of their IT teams or line managers. Make sure that all staff have received up-to-date training and are happy with their new remote set up.</p>
<p>Ensure that all devices being used to access company data have up-to-date antivirus software installed on them and automate any updates if you can. Making sure that updates are done as quickly as possible help to patch any holes or weak spots in previous versions and can be essential for preventing a data breach.</p>
<p>A great option for keeping your data secure while preserving remote access is by using a data centre. Data centres are a terrific option and can come with a range of additional security benefits, such as specialist physical 24/7 security. As well as being able to access data remotely, data centres allow for the deployment of firewalls and antivirus software across your entire network. You can read more about data centres here.</p>
<p>Another thing to consider when working remotely is using a secure connection. While it is easier in these current times to avoid public spaces and unsafe public WiFi connections, the security of your connection is still important. Ensure your WiFi is password protected and you can control who has access to the network.</p>
<p>We would highly recommend using a virtual private network (VPN). A VPN is essentially a secure passage for you to access the world wide web. Cybercriminals will look to exploit a range of areas, so it is important that your browsing and online activity is protected.</p>
<p>Keeping data secure needn’t be a worry for your business, our team are still working remotely and are available to help you with any issues that may arise when working from home. Whether you’re struggling to keep the connection or need some advice on how to implement these strategies on a longer-term basis then please get in touch with a member of our team.</p>
<p>The post <a href="https://www.probado.co.uk/keeping-data-secure-working-from-home/">Keeping data secure when working from home</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/keeping-data-secure-working-from-home/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Staying safe on social media</title>
		<link>https://www.probado.co.uk/staying-safe-on-social-media/</link>
					<comments>https://www.probado.co.uk/staying-safe-on-social-media/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Thu, 02 Jul 2020 16:47:54 +0000</pubDate>
				<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Passwords]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[Staying safe on social media]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2745</guid>

					<description><![CDATA[<p>Social media can be a fantastic place to network, promote your business and products and to share information. However, cybercriminals often look to social media to exploit weak passwords or gain information. Here is our guide to staying safe on social media. Strong Passwords A strong password</p>
<p>The post <a href="https://www.probado.co.uk/staying-safe-on-social-media/">Staying safe on social media</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-2743" src="https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges-1536x925.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges-2048x1233.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2020/07/Facebook-badges-190x114.jpg 190w" sizes="auto, (max-width: 2492px) 100vw, 2492px" /><br />
Social media can be a fantastic place to network, promote your business and products and to share information. However, cybercriminals often look to social media to exploit weak passwords or gain information. Here is our guide to staying safe on social media.</p>
<h2>Strong Passwords</h2>
<p>A strong password is essential for staying safe on social media. Weak passwords can often be the window cybercriminals use to gain access to social media accounts. This means they can access any information posted or stored on the site. Make passwords complex and don’t include personal or widely known information such as your name or office address. Enable multi-factor authentication wherever possible to ensure maximum security. This means having two or more layers of protection, for example a password and an additional PIN number sent to your mobile phone.</p>
<p>Use different passwords for each social media platform. This will ensure that if one account is compromised it will limit the potential risks across other accounts. For more tips on how to create and maintain strong passwords for your business, <a href="https://www.probado.co.uk/password-security-for-smes/">click here</a>.</p>
<h2>Don&#8217;t Share Personal Information</h2>
<p>You wouldn’t stick a poster with all of your bank details on in a busy shop window, so why put them on social media? Lots of businesses are now using social media to help advertise their products and services, which can be a great tool to help get your brand noticed. While it may be easier to tick a box and save your bank details for the next time you run a campaign, we recommend that you do not do this. If for some reason your account is compromised, all of this information could be taken and used elsewhere. It’s better to be safe than sorry!</p>
<p>Be wary of any details you choose to link to your social media accounts. If it isn’t direct contact or banking details, it might be personal details that could be used to guess a password or work out your security questions.</p>
<h2>Privacy Settings</h2>
<p>Privacy settings are there to keep you safe. Most social media sites allow you to decide what information is public or private on your account, including contact details and locations.</p>
<p>We recommend checking your settings regularly to ensure your privacy is respected even when the platform changes its rules. All platforms should inform you if anything changes with their privacy policies, but it is best to keep an eye on it yourself and manage what information is publicly available.</p>
<h2>Keep Antivirus Up-to-date</h2>
<p>Treat social media like you would any other website or app that can be subject to attack by cybercriminals. Make sure your antivirus programmes are up to date on all devices across your network. You may not think antivirus software does very much, but it is constantly running in the background, working hard to keep you safe.</p>
<p>Social media sites can be informative and helpful, but some individuals will use these channels to share fake news and bad links. Using an antivirus software will help protect you from straying into dark corners of the worldwide web.</p>
<p>Social media can be a great platform for businesses; however, there are risks and individuals that exist who will try to exploit these channels. The best way to ensure you and your employees are staying safe on social media is to regularly update training so everyone knows how to spot suspicious activity and is comfortable reporting it. Make sure you have a social media policy in place to make employees aware of best practices while using these channels.</p>
<p>For more information on how to keep your business safe, get in touch with a member of our team <a href="https://www.probado.co.uk/contact-probado/">here</a>.</p>
<p>The post <a href="https://www.probado.co.uk/staying-safe-on-social-media/">Staying safe on social media</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/staying-safe-on-social-media/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cyber security jargon you need to know</title>
		<link>https://www.probado.co.uk/cyber-security-jargon/</link>
					<comments>https://www.probado.co.uk/cyber-security-jargon/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Thu, 28 May 2020 12:39:57 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[Cyber security jargon]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2735</guid>

					<description><![CDATA[<p>Cyber security jargon can be confusing. However, securing your systems needn’t be a big, confusing job and our team is here to support you every step of the way. We’ve compiled some of the most common cyber security jargon to help you get to grips with how</p>
<p>The post <a href="https://www.probado.co.uk/cyber-security-jargon/">Cyber security jargon you need to know</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-2729" src="https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1-1536x925.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1-2048x1233.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1-190x114.jpg 190w" sizes="auto, (max-width: 2492px) 100vw, 2492px" /><br />
Cyber security jargon can be confusing. However, securing your systems needn’t be a big, confusing job and our team is here to support you every step of the way. We’ve compiled some of the most common cyber security jargon to help you get to grips with how to keep your systems safe.</p>
<h2>1. Hacker</h2>
<p>The word hacker can instantly conjure up images of masked criminals using complex codes to steal data from a computer. While the term ‘hacker’ is correct for this individual it is also a wider term used to describe those who possess the skills to gain unauthorised access to computer systems. These are not necessarily bad guys. Many software and tech companies actually employ hackers to test software and identify areas of weakness so they can be fixed.</p>
<h2>2. Phishing</h2>
<p>Not to be confused with the pastime using bait and rods, phishing is a term for an online scam. Merriam-Webster defines phishing as a ‘scam by which an internet user is duped into revealing personal or confidential information which the scammer can use illicitly’. A common example of this is a fraudulent email pretending to be a bank aiming to obtain bank details to then hack, blackmail or steal money.</p>
<h2>3. Malware</h2>
<p>The clue to malware is in the name, ‘mal’ comes from malicious and ‘ware’ from software. Malware is just that, malicious software. Viruses, spyware and Trojan horses are all various types of malware and should be protected against as much as possible. The easiest way to protect against malware is to simply be careful online. Be wary of unusual emails, strange pop-ups and alerts, and odd-looking downloads.</p>
<h2>4. Patching</h2>
<p>Patching can mean a number of different things, including fixing the hole in that old pair of jeans! When it comes to cyber security, patching is a very similar process. The National Cyber Security Centre defines patching as ‘applying updates to devices or software to improve security and/or enhance functionality’’.</p>
<h2>5. Encryption</h2>
<p>The term encryption gets thrown around a lot when it comes to cyber security, but do you know what it actually means? According to Tom’s Guide, encryption refers to ‘a process used to make sensitive data more secure’. This means converting the data into a code that wouldn’t make sense to most. Another term that you should be aware of is cryptography. This is the term for the science behind encrypting and decrypting data.</p>
<h2>6. VPN</h2>
<p>A VPN, or Virtual Private Network, is a way to safely surf the web on a public internet connection. A VPN hides your IP (internet protocol) address so that your online activities are hidden from view and safe on a potentially harmful network. Online security firm Norton describes the process as a ‘data tunnel between your local network and an exit node in another location’.</p>
<h2>7. Firewall</h2>
<p>Forcepoint defines a firewall as ‘a network security device that monitors incoming and outgoing traffic’. A firewall has the ability to block or deny access to any traffic that is deemed harmful or seems a little bit ‘phishy’. Think of it as a security guard for your device, monitoring anything attempting to gain access.</p>
<h2>8. Ransomware</h2>
<p>Ransomware is a type of malware designed to lock users out of devices or accounts and effectively hold them for ransom. Hackers will demand money or something else of value to allow the user to regain access again to their device or account. Ransomware can enter a device through a comprised website or a dodgy download. This is why firewalls and antivirus software are so important as they can attempt to stop these harmful files before they gain access.</p>
<h2>9. Clickjacking</h2>
<p>Clickjacking is a particularly sneaky way that hackers (the bad kind) will get a user to download malware or inadvertently click through to a harmful website. This is done by disguising an element on a web page as something else or creating an invisible element that users won’t even realise is there. A form of clickjacking is ‘likejacking’, which according to Imperva is a ‘technique in which the Facebook like button is manipulated, causing users to like a page or post they did not intent to’.</p>
<h2>10. Pen-testing</h2>
<p>Short for ‘penetration testing’, pen-testing can also be referred to as ethical hacking. This is a process where trained hackers will attempt to penetrate a system to look for weaknesses that cyber criminals could potentially manipulate. Described by ITGovernance.co.uk as ‘a controlled form of hacking’ pen-testing is a great way to test systems, updates, firewalls and overall security. Many companies will employ ethical hackers that will regularly attempt to access systems to ensure that they are on top of their cyber security and can patch any holes as quickly as possible!</p>
<p>When it comes to cyber security jargon there can be a lot of confusion, so it’s no surprise that users get confused and put off and end up leaving themselves at risk. However, the majority of problems can usually be fixed by ensuring staff training is up to date. With all the jargon and ever-evolving systems and technology, educating staff on key skills and processes is often missed. A business could have the best tools and the most expensive systems but if staff don’t know how to properly use these systems and aren’t aware of potential treats and how to report them, the door could be left wide open.</p>
<p>Here at Probado we aim to avoid the techno-babble and ensure you know exactly what is going on with your IT and how to operate it. If you’re unsure about some cyber security jargon or would like to know more about our training packages, get in touch with a member of our team here.</p>
<p>The post <a href="https://www.probado.co.uk/cyber-security-jargon/">Cyber security jargon you need to know</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/cyber-security-jargon/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to avoid manufacturing cyber security risks</title>
		<link>https://www.probado.co.uk/manufacturing-cyber-security-risks/</link>
					<comments>https://www.probado.co.uk/manufacturing-cyber-security-risks/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Wed, 01 Apr 2020 13:58:35 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Firewalls]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[Cyber security risks]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2681</guid>

					<description><![CDATA[<p>All manufacturers want to protect their equipment, employees and customers from cyber security risks, but what is the best way? The reality is there is no secret formula to ensure safety but there are ways to better the odds. Here are the top things to consider when</p>
<p>The post <a href="https://www.probado.co.uk/manufacturing-cyber-security-risks/">How to avoid manufacturing cyber security risks</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-2679" src="https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot-1536x925.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot-2048x1233.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot-190x114.jpg 190w" sizes="auto, (max-width: 2492px) 100vw, 2492px" /><br />
All manufacturers want to protect their equipment, employees and customers from cyber security risks, but what is the best way? The reality is there is no secret formula to ensure safety but there are ways to better the odds. Here are the top things to consider when looking at how to avoid manufacturing cyber security threats and stay as safe as possible.</p>
<h2>1. Training</h2>
<p>Training is vital for all staff. You wouldn’t send a footballer on to the pitch with no knowledge of the game, so why would you allow employees to use computers and computerised equipment without basic cyber security training?</p>
<p>Whether staff are using an email account or operating a complex piece of machinery, training them to be able to identify suspicious activity and report it to the correct member of staff could save your business thousands or even millions. Consider the long-term impact a breech might have on your hard-earned brand the potential impact in your supply chain(s).</p>
<h2>2. Antivirus and firewalls</h2>
<p>It may seem like a simple step but ensuring you have antivirus software and firewalls installed across your network is one of the best (and easiest) ways to protect your business from a cyber-attack. Such software can be deployed from across the entire network with ease, a small price to pay.</p>
<p>Ensure all your antivirus software (as well as other general apps and programmes) are updated as and when required. We know those update pop-ups can be irritating, however, ignoring them could come at a huge risk. Updates are there to plug holes and improve performance. If a programme, device or application is not updated when required it could leave a gap for hackers and other cyber criminals to access your network.</p>
<p>Make sure all updates are done as soon as they can be and auto enable them where possible.</p>
<h2>3. Access and passwords</h2>
<p>Only give access where necessary, it is not a matter of trust, if someone’s login gets comprised, cybercriminals could potentially gain access to the entire network. Only give staff access to server areas, equipment and files that they need to do their jobs properly. Additional access can be granted at a further date but restricting access where it isn’t needed is a great start to minimise risk.</p>
<p>Physical access also benefits from being restricted. If everyone on site has a master key to all areas, should one get lost or into the wrong hands the entire facility is at risk. Be mindful when granting access, again this can always be modified at a later date should an employee’s requirements and remits change.</p>
<p>Having strong passwords is key, not just for manufacturers but for everyday life. Avoid using the same passwords for multiple accounts as well as easy to guess passwords such as ‘password’ or ‘12345’. Implementing multi-factor authentication (MFA) is also a good option. MFA grants access after two or more ‘factors’ are fulfilled. Some common MFA factors are:</p>
<p>• Password<br />
• Additional pin number<br />
• Fingerprint<br />
• Additional device or key<br />
• Voice recognition</p>
<h2>4. New technologies</h2>
<p>Another step to take to prevent any cyber security risks is by ensuring your Wi-Fi connection is secure is essential. This is not just for emails and browsing on the web, with many manufacturers now implementing internet of things (IoT) technologies into their processes, internet security is more important than ever.</p>
<p>A joint Ponemon Institute and Shared Assessments report showed that less than 20% of risk professionals could identify all IoT devices within their organisations. Ensure your IT team is aware of any new devices, however big or small. Think of it this way, if it has an internet connection, it can be hacked or manipulated.</p>
<h2>5. Supply chain</h2>
<p>If you work within a supply chain, then you definitely need to bear in mind the security of each business in the chain. While the majority may be on top of their security, if one is lacking then they pose a risk to all in the network. A supply chain is only as strong as its weakest link.</p>
<p>Supply chains are becoming increasingly desirable to cyber criminals as there are ultimately more users and data to target. There are however some simple steps businesses can take to minimise the risk:</p>
<p>• Perform a cyber risk audit at the beginning of new business relationships.<br />
• Conduct regular reviews of everyone’s cyber security.<br />
• If you notice a risk or area of weakness, inform other businesses as a matter of urgency.<br />
• If your business experiences a breach, notify all parties in the supply chain as soon as possible.</p>
<p>For more information on how to protect your manufacturing business from cyber risks, get in touch with our team here.</p>
<p>The post <a href="https://www.probado.co.uk/manufacturing-cyber-security-risks/">How to avoid manufacturing cyber security risks</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/manufacturing-cyber-security-risks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to maximise cyber security across multiple manufacturing sites</title>
		<link>https://www.probado.co.uk/cyber-security-across-multiple-sites/</link>
					<comments>https://www.probado.co.uk/cyber-security-across-multiple-sites/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Wed, 11 Mar 2020 01:08:49 +0000</pubDate>
				<category><![CDATA[Cloud Storage]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Security Updates]]></category>
		<category><![CDATA[What's On]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2667</guid>

					<description><![CDATA[<p>Large manufacturers often have multiple sites and complex supply chains which increases potential vulnerabilities when considering cyber security risks. But knowing how to maximise cyber security across your multiple manufacturing sites will help prevent any breaches and keep your data and processes safe. According to Computer Weekly,</p>
<p>The post <a href="https://www.probado.co.uk/cyber-security-across-multiple-sites/">How to maximise cyber security across multiple manufacturing sites</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-2671" src="https://www.probado.co.uk/wp-content/uploads/2020/03/science-in-hd-i4ABHj811N0-unsplash-scaled.jpg" alt="" width="2560" height="1761" srcset="https://www.probado.co.uk/wp-content/uploads/2020/03/science-in-hd-i4ABHj811N0-unsplash-scaled.jpg 2560w, https://www.probado.co.uk/wp-content/uploads/2020/03/science-in-hd-i4ABHj811N0-unsplash-300x206.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2020/03/science-in-hd-i4ABHj811N0-unsplash-1024x704.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2020/03/science-in-hd-i4ABHj811N0-unsplash-768x528.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2020/03/science-in-hd-i4ABHj811N0-unsplash-1536x1056.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2020/03/science-in-hd-i4ABHj811N0-unsplash-2048x1408.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2020/03/science-in-hd-i4ABHj811N0-unsplash-160x110.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2020/03/science-in-hd-i4ABHj811N0-unsplash-87x60.jpg 87w, https://www.probado.co.uk/wp-content/uploads/2020/03/science-in-hd-i4ABHj811N0-unsplash-190x131.jpg 190w" sizes="auto, (max-width: 2560px) 100vw, 2560px" /><br />
Large manufacturers often have multiple sites and complex supply chains which increases potential vulnerabilities when considering cyber security risks. But knowing how to maximise cyber security across your multiple manufacturing sites will help prevent any breaches and keep your data and processes safe.</p>
<p>According to Computer Weekly, almost half of UK manufacturers have experienced a cyber security incident, with Enscite also reporting that the manufacturing sector is the third most hit by cyberattacks in the UK.</p>
<p>Managing cyber security risks on just one site can be challenging let alone at multiple locations. Here is everything you need to consider to ensure all your manufacturing sites are as cyber-safe as possible.</p>
<h2>Have a dedicated team</h2>
<p>Most manufacturers will have a dedicated IT or cyber security team; however, they may only be based in the head office or one central location. Having a dedicated member of staff on each site (or at the very least, regular visits and audits) is crucial to being able to identify cyber security risks, data breaches or weak spots and manage them effectively and quickly.</p>
<p>There are many cyber-attacks that can lay undetected to the untrained eye until it is too late. It can take companies over six months to identify a data breach, therefore having specialist staff on the ground at each location can ensure that any breaches are identified and dealt with as soon as possible.</p>
<h2>Provide training for all employees – your first and last line of defence</h2>
<p>Training is essential for ensuring cyber security across multiple manufacturing sites. Providing training just for your IT team is not enough – all staff need to be trained in basic cyber security, covering everything from how to identify a spam email to the reporting procedure in your organisation. Whether they’re working with a single email account or a specialist piece of computer operated equipment, cyber security training is essential.</p>
<p>It is not always possible for the IT team to be on hand 24 hours a day but if all staff are vigilant and aware of what to look out for, it can help protect not just their site, but the entire network including admin systems, manufacturing equipment, specialist software and customer data.</p>
<h2>Be vigilant with technology</h2>
<p>More and more manufacturers are investing in artificial intelligence, robotics, Internet of Things (IoT) technologies and Industry 4.0. These are incredible developments in the manufacturing sector that can provide significant value to manufacturing sites and end products alike.</p>
<p>However, with great connectivity comes greater cyber security risk. The more devices that are connected to the internet and are controlled via automated technology, the more targets there are for hackers and cyber criminals. Ensure your entire network is covered by firewalls, anti-virus software and is password protected. Multi-factor authentication (including biometrics) is a great step to enforce, adding an extra layer of protection to devices, accounts and equipment.</p>
<h2>Be equal across sites</h2>
<p>Ensure all sites have the same level of cyber security in place. If one site has a weak spot, hackers can manipulate this to gain access to the entire network covering all locations. While manufacturers will want to invest in tools and equipment to improve the work they produce and the value they can give to customers, investing in cyber security programmes, equipment and training is just as important.</p>
<p>This will not only protect your business but also your customers’ information. With almost 60% of customers asking for proof of the robustness of a manufacturer’s cyber security system, its importance can’t be ignored. Having an even blanket of protection over all sites means that each base and each customer has the best possible chance at avoiding a cyber-attack.</p>
<p>We work with a number of manufacturing businesses across a variety of sectors to ensure their work across multiple sites is as safe as possible. If you’re looking to improve the cyber security of your manufacturing sites, get in touch with a member of our team here.</p>
<p>The post <a href="https://www.probado.co.uk/cyber-security-across-multiple-sites/">How to maximise cyber security across multiple manufacturing sites</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/cyber-security-across-multiple-sites/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>On-premise vs Cloud storage</title>
		<link>https://www.probado.co.uk/on-premise-vs-cloud-storage/</link>
					<comments>https://www.probado.co.uk/on-premise-vs-cloud-storage/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Thu, 26 Sep 2019 16:08:01 +0000</pubDate>
				<category><![CDATA[Cloud Storage]]></category>
		<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Hosting]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[What's On]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2597</guid>

					<description><![CDATA[<p>Regardless of your industry, virtually every company requires a secure data storage system to house important documents and sensitive information. Technological advancements mean there are various data storage options available, whether on-premise or in the cloud. Each solution has advantages and disadvantages – so which storage solution</p>
<p>The post <a href="https://www.probado.co.uk/on-premise-vs-cloud-storage/">On-premise vs Cloud storage</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-2595" src="https://www.probado.co.uk/wp-content/uploads/2019/09/Servers_2492x1500.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2019/09/Servers_2492x1500.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2019/09/Servers_2492x1500-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2019/09/Servers_2492x1500-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2019/09/Servers_2492x1500-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2019/09/Servers_2492x1500-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2019/09/Servers_2492x1500-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2019/09/Servers_2492x1500-190x114.jpg 190w" sizes="auto, (max-width: 2492px) 100vw, 2492px" /><br />
Regardless of your industry, virtually every company requires a secure data storage system to house important documents and sensitive information.</p>
<p>Technological advancements mean there are various data storage options available, whether on-premise or in the cloud. Each solution has advantages and disadvantages – so which storage solution is right for your business?</p>
<h2>On-premise Solution</h2>
<p>The term “on-premise” refers to local hardware, meaning all company data is stored on servers, computers and other devices within the company site.</p>
<p>One of the main advantages to on-premise solutions is the security, which is of critical importance today. According to a report by Risk Based Security, over four billion data records were compromised in 2016 alone.</p>
<p>Whilst no single method can ever be 100% effective at preventing breaches, storing data locally can help keep remote hackers out of a system.</p>
<p>Having said that, it is imperative that organisations implement safeguards to protect their on-premise device. A study conducted by the Ponemon Institute found that 59% of disgruntled employees will take sensitive data with them.</p>
<p>Many organisations remain reluctant to opt for on-premise solutions due to higher upfront and lifespan costs. Like all computers, on-site servers do not have an infinite lifespan and they will need to be serviced regularly.</p>
<p>Besides maintenance costs, on-premise storage solutions also come with some significant indirect costs. Their very nature requires them to be running constantly to ensure accessibility, which in turn has an impact on monthly energy bills, particularly for larger companies with more than one device.</p>
<h2>Cloud Storage</h2>
<p>Unlike on-premise storage, cloud services are remote servers or hardware maintained by a third-party provider. This provider will sell storage space, bandwidth and access requests to organisations, depending on company needs.</p>
<p>It is unsurprising that cloud data is almost always cheaper than on-premise solutions. By using cloud storage, an organisation can tailor its solution to suit its specific needs. If the organisation only requires 14TB of storage space, it can purchase that exact amount.</p>
<p>Most reputable cloud providers will allow companies to change their plans simply. At the touch of a button, organisations can add more space to a plan, or alternatively decrease storage, ultimately saving the company money.</p>
<p>Another benefit of cloud data storage is the ability to access data remotely at any time. When an organisation purchases cloud storage, it is given access credentials which can be used to access data via the internet, offering a great deal of flexibility.</p>
<p>A major drawback of cloud storage is the risk of security breaches. Unfortunately, remote servers are accessible by anybody at any time, leaving organisations without proper encryption open to cyber-attacks. In order to ensure safety, it is of high importance that companies ensure their systems are fully secured and only accessed by authorised members of staff.</p>
<p>Whichever solution you choose, it pays to talk to a professional who can help you decide the best solution to suit your business. For more information, drop us a line or, for more on online security, see our previous blog.</p>
<p>The post <a href="https://www.probado.co.uk/on-premise-vs-cloud-storage/">On-premise vs Cloud storage</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/on-premise-vs-cloud-storage/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Top five ways to protect IT systems while you are away</title>
		<link>https://www.probado.co.uk/protect-it-systems/</link>
					<comments>https://www.probado.co.uk/protect-it-systems/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Wed, 10 Jul 2019 11:02:05 +0000</pubDate>
				<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[Protect IT Systems]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2559</guid>

					<description><![CDATA[<p>An increasing number of people are now working out of the office. Whether that means working from home, going on a business trip or even checking emails while you take a well-earned break. Wherever you are it’s important to protect IT systems and prevent data breaches. Here</p>
<p>The post <a href="https://www.probado.co.uk/protect-it-systems/">Top five ways to protect IT systems while you are away</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-full wp-image-2565 aligncenter" src="https://www.probado.co.uk/wp-content/uploads/2019/07/Out-of-office.jpg" alt="" width="2492" height="1850" srcset="https://www.probado.co.uk/wp-content/uploads/2019/07/Out-of-office.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2019/07/Out-of-office-300x223.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2019/07/Out-of-office-768x570.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2019/07/Out-of-office-1024x760.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2019/07/Out-of-office-160x120.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2019/07/Out-of-office-81x60.jpg 81w, https://www.probado.co.uk/wp-content/uploads/2019/07/Out-of-office-190x141.jpg 190w" sizes="auto, (max-width: 2492px) 100vw, 2492px" /><br />
An increasing number of people are now working out of the office. Whether that means working from home, going on a business trip or even checking emails while you take a well-earned break. Wherever you are it’s important to protect IT systems and prevent data breaches. Here are our top five tips on how to make sure your data stays safe while you’re out of the office.</p>
<h2>Safe Connections</h2>
<p>Logging on to Wi-Fi when you’re out and about is sometimes necessary, but always look for a secure connection. That means Wi-Fi with a password. While lots of places have password protected Wi-Fi, be wary of the ones who publicly advertise the passwords, for example on the wall of a café, as these can be just as unsafe as those with no password at all.</p>
<p>Make sure you turn off the auto-connect for Bluetooth as well as Wi-Fi, especially when travelling. Open networks provide hackers with an open door into your devices and all the data stored on them.</p>
<p>Consider using a virtual private network (VPN). VPNs are a great way to protect your data before you even start surfing as they create an encrypted tunnel for you to access the internet.</p>
<h2>Keep On Top of Updates</h2>
<p>A simple way to keep your IT systems and devices safe is to ensure all software and security updates are done before you leave the safety of your office. This way your devices will be protected for your trip, as well as any devices you are leaving behind. Run an anti-virus scan to make sure there’s nothing already lurking behind the screen.</p>
<p>Ensuring your passwords are updated before you leave is a good idea too. Make sure they are safe and strong. Look into Multi-Factor Authentication as it will add an extra layer of protection and can act as a deterrent to possible hackers.</p>
<h2>Social Butterfly</h2>
<p>While it can seem like everything is being put on social media these days, we recommend you wait until you get home to share any travel snaps or stories. Letting people know your house or office is empty leaves it vulnerable. Think of all the personal data that is sitting there! Tagging locations also makes it easy for hackers to determine your routine and latch on to any weak spots during your day-to-day life.</p>
<h2>Be On the Ball</h2>
<p>Keep an eye on your most important accounts when jet setting. It is much easier to spot any fraudulent activity if you’re on top of things. Any issues that arise are much easier to deal with the sooner they get noticed. The longer a hacker is able to control your device without detection the more harmful it can be.</p>
<h2>Bare Essentials</h2>
<p>Minimise the risk of theft by only travelling with the essentials. Keep the devices you’re taking to a minimum. Many hotels provide a safe for their clientele. Take full advantage of this and store any devices, documents or sensitive information in here when you’re out and about.</p>
<p>This may seem like a lot to consider when you’re preparing to leave the office but if you get into the habit of checking and updating things regularly it will soon become part of your routine.</p>
<h2>Bon Voyage!</h2>
<p>For more information on how to protect IT systems while you’re out of the office, contact us today on <a href="mailto:info@probado.co.uk">info@probado.co.uk</a></p>
<p>The post <a href="https://www.probado.co.uk/protect-it-systems/">Top five ways to protect IT systems while you are away</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/protect-it-systems/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
