<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Security Archives &#8211; IT Support Services in Huddersfield, Yorkshire</title>
	<atom:link href="https://www.probado.co.uk/category/cyber-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.probado.co.uk/category/cyber-security/</link>
	<description></description>
	<lastBuildDate>Thu, 10 Jun 2021 13:42:16 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://www.probado.co.uk/wp-content/uploads/2017/10/favicon-1.png</url>
	<title>Cyber Security Archives &#8211; IT Support Services in Huddersfield, Yorkshire</title>
	<link>https://www.probado.co.uk/category/cyber-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Spotting spam: how to identify a phishing email</title>
		<link>https://www.probado.co.uk/spotting-spam-how-to-identify-a-phishing-email/</link>
					<comments>https://www.probado.co.uk/spotting-spam-how-to-identify-a-phishing-email/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Thu, 10 Jun 2021 13:39:34 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[Phishing email]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2986</guid>

					<description><![CDATA[<p>Phishing emails have become increasingly common and are now often accepted as part of our day-to-day lives online. While some are super easy to spot (we’re talking mysterious royals with terrible spelling offering you billions of pounds to simply click their link), others can be harder to</p>
<p>The post <a href="https://www.probado.co.uk/spotting-spam-how-to-identify-a-phishing-email/">Spotting spam: how to identify a phishing email</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-2992" src="https://www.probado.co.uk/wp-content/uploads/2021/06/Laptop-phishing-email.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2021/06/Laptop-phishing-email.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2021/06/Laptop-phishing-email-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2021/06/Laptop-phishing-email-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2021/06/Laptop-phishing-email-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2021/06/Laptop-phishing-email-1536x925.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2021/06/Laptop-phishing-email-2048x1233.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2021/06/Laptop-phishing-email-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2021/06/Laptop-phishing-email-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2021/06/Laptop-phishing-email-190x114.jpg 190w" sizes="(max-width: 2492px) 100vw, 2492px" /><br />
Phishing emails have become increasingly common and are now often accepted as part of our day-to-day lives online.</p>
<p>While some are super easy to spot (we’re talking mysterious royals with terrible spelling offering you billions of pounds to simply click their link), others can be harder to detect and can easily fly under the radar.</p>
<p>Our team has identified some small things that you can look out for and best practice habits to ensure you don’t fall victim to a malicious email.</p>
<h2>What is a phishing email?</h2>
<p>One of the best ways to avoid falling prey to a phishing email is to first educate yourself about them, what they are hoping to achieve and how they work.</p>
<p><a href="https://www.probado.co.uk/cyber-security-jargon/">Phishing</a> is a method that hackers use to try and trick ordinary people into providing personal details, bank details, access to devices or networks, or money.</p>
<p>They do this by creating copycat emails designed to look like legitimate people, businesses or organisations.</p>
<p>It is worth noting that phishing isn’t a practice that is exclusive to emails. Phone calls, text messages and even some postal communications can be phishing for your details.</p>
<p>Common phishing attacks will aim to look like an individual’s bank, courier service, online shopping outlet or a Government agency such as HMRC.</p>
<p>A lot of phishing tactics use fear to try to persuade unsuspecting individuals to act quickly, without thinking things through or looking too closely at the fake email. This could include threats of accounts being closed or compromised, or even police action being taken.</p>
<p>It is very unlikely that HMRC will email you threatening arrest, so stay calm and fully evaluate the email in front of you without making any hasty clicks!</p>
<h2>Spelling and grammar</h2>
<p>One of the easiest ways to spot a phishing email is through spelling mistakes and grammar issues.</p>
<p>If you suspect an email is fake, read through it carefully and identify any errors. These may be minor, but they can be a useful indicator that an email is fraudulent.</p>
<p>Some fraudsters are very good at disguising discrepancies, so give the email a thorough check before taking any action.</p>
<p>Also check logos and company names. For example, two letter ‘N’s next to one another can easily be read as an ‘M’ at a glance. Or a zero as the letter ‘O’.</p>
<p><img decoding="async" class="size-full wp-image-2993 alignnone" src="https://www.probado.co.uk/wp-content/uploads/2021/06/Phishlabs.png" alt="" width="662" height="440" srcset="https://www.probado.co.uk/wp-content/uploads/2021/06/Phishlabs.png 662w, https://www.probado.co.uk/wp-content/uploads/2021/06/Phishlabs-300x199.png 300w, https://www.probado.co.uk/wp-content/uploads/2021/06/Phishlabs-160x106.png 160w, https://www.probado.co.uk/wp-content/uploads/2021/06/Phishlabs-90x60.png 90w, https://www.probado.co.uk/wp-content/uploads/2021/06/Phishlabs-190x126.png 190w" sizes="(max-width: 662px) 100vw, 662px" /></p>
<p><a href="https://info.phishlabs.com/blog/eliminating-the-threat-of-look-alike-domains">Source: PhishLabs</a></p>
<h2>Too good to be true</h2>
<p>If you receive an email that seems too good to be true, then it probably is! It is very unlikely that your bank will email you about winning millions of pounds. Be wary of any offers that arrive in your inbox.</p>
<p>While lots of brands do communicate offers and deals via email, keep a look out for any that seem to go above and beyond and always check their websites for corresponding messaging.</p>
<p><img decoding="async" class="size-full wp-image-2994 alignnone" src="https://www.probado.co.uk/wp-content/uploads/2021/06/Scam-detector.jpg" alt="" width="501" height="460" srcset="https://www.probado.co.uk/wp-content/uploads/2021/06/Scam-detector.jpg 501w, https://www.probado.co.uk/wp-content/uploads/2021/06/Scam-detector-300x275.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2021/06/Scam-detector-131x120.jpg 131w, https://www.probado.co.uk/wp-content/uploads/2021/06/Scam-detector-65x60.jpg 65w, https://www.probado.co.uk/wp-content/uploads/2021/06/Scam-detector-190x174.jpg 190w" sizes="(max-width: 501px) 100vw, 501px" /></p>
<p><a href="https://www.scam-detector.com/article/lottery-winner-donation-scam/">Source: Scam Detector</a></p>
<h2>Personal details</h2>
<p>Spot a phishing email by identifying what it is asking you to do. If it is asking you to provide personal details (such as address, bank details, national insurance number, etc), it is probably spam.</p>
<p>We recommend you contact the alleged sender via another method (for example a phone call or live chat feature on the legitimate site) to determine if the request is genuine.</p>
<p>All major organisations should have records of emails and requests for information so will be able to advise you on how to proceed.</p>
<h2>Check and check again</h2>
<p>Always double check emails before sending any information or clicking any links. You may have missed a vital clue in the first read, so give it a second look for good measure.</p>
<p>A handy tip is to check both the display name and the email address. When viewing emails on a mobile device, it is often just the display name that is visible at a first glance, which offers hackers a simple way to hide.</p>
<p>Check the email address before proceeding. People generally know the email addresses and domain names of their bank providers and any other businesses or organisations they use, so it can be easy to spot any fakers!</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-2995 alignnone" src="https://www.probado.co.uk/wp-content/uploads/2021/06/dpd-laptop-scaled.jpg" alt="" width="2560" height="1529" srcset="https://www.probado.co.uk/wp-content/uploads/2021/06/dpd-laptop-scaled.jpg 2560w, https://www.probado.co.uk/wp-content/uploads/2021/06/dpd-laptop-300x179.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2021/06/dpd-laptop-1024x611.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2021/06/dpd-laptop-768x459.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2021/06/dpd-laptop-1536x917.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2021/06/dpd-laptop-2048x1223.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2021/06/dpd-laptop-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2021/06/dpd-laptop-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2021/06/dpd-laptop-190x113.jpg 190w" sizes="auto, (max-width: 2560px) 100vw, 2560px" /></p>
<p><a href="https://www.dpdlocal.co.uk/content/about_dpd/phishing.jsp">Source: DPD Local</a></p>
<h2>Click savvy</h2>
<p>If you think an email is suspicious, please do not click the link. If you want to check the message out by heading to an official site, do so by opening up an independent, secure browser and visit the site directly – do not click the link in the email.</p>
<p>Another useful tip is when you see a suspicious link, simply move your mouse pointer over the link, BUT DO NOT CLICK IT!</p>
<p>This will show you the true destination. If you click the link, these are often harvesting web sites which seek to secure more of your personal data. When cyber criminals have your data, its highly likely you will become the target of an exponential attack rate since your details will likely be traded with other malicious criminals and the circle continues.</p>
<p>Sometimes one click is all it takes for hackers to gain access, so don’t give them that opportunity! Head directly to the site on your own browser.</p>
<p>When it comes to suspicious attachments, we advise you reach out to whoever is supposedly sending them and verify that they are legitimate and safe. We also offer a FOC quarantine service to our clients to advise in these circumstances.</p>
<p>This can often occur in the workplace, so if a random attachment lands in your inbox that you were not expecting, the best thing to do would be to ask the person directly if it is truly them.</p>
<p>To avoid any issues, we suggest alerting someone if you need to send them an attachment and advise what method you will use to send this.</p>
<p>When you know what to look out for, it can be easy to spot a phishing email. Fraudsters often depend on quick, hurried actions so take your time and examine what is in front of you.</p>
<p>We work closely with security provider KnowBe4, with our clients using this platform to train staff on cyber security issues with increased awareness and accountability. Tools like this are fantastic to help minimise the costs of data loss and identify theft, all while helping employees to be more vigilant and aware of potential cyber threats.</p>
<p>For more information on KnowBe4 and how it can be implemented in your business, <a href="https://www.probado.co.uk/contact-probado/">get in touch</a> with our team via <a href="mailto:info@probado.co.uk">info@probado.co.uk</a>.</p>
<p>The post <a href="https://www.probado.co.uk/spotting-spam-how-to-identify-a-phishing-email/">Spotting spam: how to identify a phishing email</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/spotting-spam-how-to-identify-a-phishing-email/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Making Tax Digital: can your IT keep up?</title>
		<link>https://www.probado.co.uk/making-tax-digital/</link>
					<comments>https://www.probado.co.uk/making-tax-digital/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Fri, 09 Apr 2021 09:57:29 +0000</pubDate>
				<category><![CDATA[Back up Files]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Centre]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Making Tax Digital]]></category>
		<category><![CDATA[What's On]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2969</guid>

					<description><![CDATA[<p>Making Tax Digital (MTD) is aiming to revamp the tax system, transforming it into a completely digital model. This should make the whole tax process more streamlined, as well as improving efficiency, making it easier for businesses to keep on top of their taxes. But, as with</p>
<p>The post <a href="https://www.probado.co.uk/making-tax-digital/">Making Tax Digital: can your IT keep up?</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-2970" src="https://www.probado.co.uk/wp-content/uploads/2021/04/Tax-digital.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2021/04/Tax-digital.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2021/04/Tax-digital-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2021/04/Tax-digital-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2021/04/Tax-digital-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2021/04/Tax-digital-1536x925.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2021/04/Tax-digital-2048x1233.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2021/04/Tax-digital-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2021/04/Tax-digital-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2021/04/Tax-digital-190x114.jpg 190w" sizes="auto, (max-width: 2492px) 100vw, 2492px" /><br />
Making Tax Digital (MTD) is aiming to revamp the tax system, transforming it into a completely digital model. This should make the whole tax process more streamlined, as well as improving efficiency, making it easier for businesses to keep on top of their taxes.</p>
<p>But, as with any digital overhaul, your IT needs to be able to keep up and support these changes.</p>
<h2>What does it mean for me?</h2>
<p>The first phase of <a href="https://www.gov.uk/government/publications/making-tax-digital/overview-of-making-tax-digital">making tax digital</a> was introduced in 2019 and aims to make tax records and returns completely paperless by going digital. This should make it easier for businesses to manage their taxes and easily find, view and make changes.</p>
<p>The full digital overhaul is being managed in stages. 2019 saw the first phase affect VAT-registered firms with a <a href="https://www.simplybusiness.co.uk/knowledge/articles/2020/08/what-is-making-tax-digital/">taxable turnover above £85,000</a>. The next stage of making tax digital will see all VAT-registered businesses becoming compliant for VAT from April 2022, with self-assessment taxpayers becoming compliant for income tax from April 2023.</p>
<h2>Small Changes, Big Impact</h2>
<p>Going digital may be a struggle for some firms, but there is no need to panic, as plenty of support is available. There are a range of apps and software that can help your business to make the change. Products like QuickBooks and Xero are good options for making tax digital, while an external advisor or agency can also help you make the change.</p>
<p>Installing new software, or developing your digital processes, in order to keep up can have an impact on your existing IT. However, there are some simple changes you can make yourself to help your IT keep up with making tax digital &#8211; and ensure the process is as smooth and efficient as possible.</p>
<ol>
<li>Ensure updates to all applications, software and devices are completed quickly and regularly. Most devices give you the option to <a href="https://www.probado.co.uk/security-and-software-updates/">automate these updates</a>, and this is a handy feature as it eliminates the need for manually installing the updates. Programmes that are not up to date can slow down performance and affect your device’s overall speed. Keeping on top of updates also ensures that any security vulnerabilities and useability issues are fixed, while you will also benefit from new and improved features as soon as they are available.<br />
.</li>
<li>We recommend that you regularly perform an IT health check. Make sure all your files are backed up, and run regular anti-virus checks to ensure everything is performing as it should. A <a href="https://www.probado.co.uk/what-are-data-centres/">data centre</a> is a great option for this as it ensures that security software is deployed and maintained across your entire network, while keeping your files, data and everything else secure.<br />
.</li>
<li>If you install any new software to help with your digitisation, we recommend that you request a demonstration from the provider. They can show you the best, easiest way to use the software and answer any questions you may have. Obviously, you will learn more as you familiarise yourself with the software, but we always find that it’s useful to hit the ground running. This can save a lot of time and allow you to get on with the important job of running your business.<br />
.</li>
<li>Once you’re set up with new software, ensure all staff have access to training on how to use it. Whether this is from a trained individual within the team or through a session with the provider, it is important that everyone feels comfortable using the software. This will also help users spot anything out of the ordinary so that they can flag an issue as it arises or make you aware of areas where further training or guidance would be beneficial.</li>
</ol>
<h2>A Helping Hand</h2>
<p>Making tax digital provides the perfect opportunity to optimise your IT. As with the tax system, many processes are going online &#8211; and even more so with the Covid-19 pandemic – so it is vital that your business stays ahead of the curve and is ready for digitisation. If you have any questions, or want to learn more about future-proofing your IT system, <a href="https://www.probado.co.uk/contact-probado/">get in touch</a> with a member of our team – we’re always happy to help.</p>
<p>The post <a href="https://www.probado.co.uk/making-tax-digital/">Making Tax Digital: can your IT keep up?</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/making-tax-digital/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Love is in the air: the IT trends you&#8217;re loving for 2021</title>
		<link>https://www.probado.co.uk/it-trends-for-2021/</link>
					<comments>https://www.probado.co.uk/it-trends-for-2021/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Thu, 11 Feb 2021 21:11:00 +0000</pubDate>
				<category><![CDATA[5G]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[IT Trends]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2939</guid>

					<description><![CDATA[<p>Love is in the air this month with an amazing selection of new IT trends that we’re excited about for 2021. From remote working to machine led industries, there is something that everyone will come across in 2021. Here are our top five IT trends for this</p>
<p>The post <a href="https://www.probado.co.uk/it-trends-for-2021/">Love is in the air: the IT trends you&#8217;re loving for 2021</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-2964" src="https://www.probado.co.uk/wp-content/uploads/2021/02/Internet3.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2021/02/Internet3.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2021/02/Internet3-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2021/02/Internet3-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2021/02/Internet3-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2021/02/Internet3-1536x925.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2021/02/Internet3-2048x1233.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2021/02/Internet3-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2021/02/Internet3-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2021/02/Internet3-190x114.jpg 190w" sizes="auto, (max-width: 2492px) 100vw, 2492px" /><br />
Love is in the air this month with an amazing selection of new IT trends that we’re excited about for 2021. From remote working to machine led industries, there is something that everyone will come across in 2021. Here are our top five IT trends for this year:</p>
<h2>1. Internet of Things</h2>
<p>Another IT trend with no intention of slowing down is the Internet of Things (IoT). It was recorded that in 2019, <a href="https://securitytoday.com/Articles/2020/01/13/The-IoT-Rundown-for-2020.aspx?Page=2">26.66 billion IoT devices</a> were installed, with experts predicting that this number will surpass 75 billion in 2025. It is estimated that every second, approximately 127 IoT devices are being connected to the internet. From industry to the everyday home, IoT is taking over, check out some examples of weird and wonderful IoT technologies <a href="https://www.probado.co.uk/internet-of-things/">here</a>.</p>
<p>Here at Probado, we are monitoring systems using IoT technologies, helping our clients to save time, money and avoid wastage. If you’re interested in finding out more, <a href="https://www.probado.co.uk/contact-probado/">give us a call</a> – we have loads of different sensors and a visualisation platform that we can tailor to your needs.</p>
<h2>2. Artificial Intelligence</h2>
<p>Artificial intelligence (AI) is set to be huge this year, with new uses for AI technology being found daily. AI technology <a href="https://financesonline.com/it-trends/">dates back to the 1950s</a> and is still growing, more so in recent years. AI technology is efficient, eliminates human error and is able to work around the clock, speeding up many processes. One of the most popular AI programmes is the <a href="https://reviews.financesonline.com/p/apache-predictionio/">ApachePredictionIO</a>, with a <a href="https://reviews.financesonline.com/p/apache-predictionio/">user satisfaction of 100%</a>. This software allows developers to build and publish a machine learning engine to the internet as well as providing access to multiple machine learning libraries.</p>
<h2>3. Cybersecurity</h2>
<p>With more and more businesses adopting remote and flexible working models, there is an increased focus on cyber security. More workers are now working outside of the safeties of the office, so it is vital that employees are staying protected when working from home. While we are starting to see the light at the end of the tunnel when it comes to the pandemic, it is predicted that over a third of workforces will remain remote for <a href="https://threatpost.com/2021-cybersecurity-trends/162629/">at least 18 months</a>. Home cyber security systems may not be as robust as those within the office, and there are likely be inconsistencies from house to house.</p>
<h2>4. 5G</h2>
<p>5G was huge in 2020 and it is only set to get bigger in 2021 as more people take up this technology. Currently, <a href="https://www.edureka.co/blog/top-10-trending-technologies/">Switzerland, South Korea and the USA</a> are leading the way with 5G take up. 5G can operate up to 100 times faster than 4G technologies, allowing for a myriad of <a href="https://www.probado.co.uk/it-trends-for-2021/">uses across many different industries</a>. When 5G first appeared on the scene, many were sceptical about this new technology, however now that it has been tried and tested in the real world, those who were originally on the fence are being swayed to try 5G in 2021.</p>
<h2>5. Internet of Behaviours</h2>
<p>Internet of Behaviours (IoB) is the collection of data to influence behaviour using behavioural psychology. IoB data can be gathered from many different sources, such as GPS locations, social media and customer data. Axios describes IoB as trying to make sense of human behaviour through data mining.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-2953 aligncenter" src="https://www.probado.co.uk/wp-content/uploads/2021/02/Internet-of-things-diagram3.jpg" alt="" width="460" height="400" srcset="https://www.probado.co.uk/wp-content/uploads/2021/02/Internet-of-things-diagram3.jpg 460w, https://www.probado.co.uk/wp-content/uploads/2021/02/Internet-of-things-diagram3-300x261.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2021/02/Internet-of-things-diagram3-138x120.jpg 138w, https://www.probado.co.uk/wp-content/uploads/2021/02/Internet-of-things-diagram3-69x60.jpg 69w, https://www.probado.co.uk/wp-content/uploads/2021/02/Internet-of-things-diagram3-190x165.jpg 190w" sizes="auto, (max-width: 460px) 100vw, 460px" /></p>
<p><a href="https://gbksoft.com/blog/internet-of-behaviors/">Source: GBKSoft</a><br />
IoB helps us to truly understand the masses of data we now have access to (partly thanks to IoT technologies) and helps organisations to apply that understanding and influence behaviours, whether that be within their employees or their customers.</p>
<p>2021 is set to be an exciting time for IT. There are a number of IT trends that we think will dominate the tech space this year. Whether it be 5G or Internet of Behaviours, we’d love to hear what your thoughts are on this year’s IT trends, head to <a href="https://twitter.com/ProbadoLtd">Twitter</a> to be part of the conversation!</p>
<p>The post <a href="https://www.probado.co.uk/it-trends-for-2021/">Love is in the air: the IT trends you&#8217;re loving for 2021</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/it-trends-for-2021/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Spooky Stories: Horror Stories from the World of IT</title>
		<link>https://www.probado.co.uk/spooky-stories/</link>
					<comments>https://www.probado.co.uk/spooky-stories/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Thu, 22 Oct 2020 10:29:59 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[World of IT]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2855</guid>

					<description><![CDATA[<p>It’s almost that time of year, pumpkins are being carved, costumes are being bought for (virtual) parties, and we’re stocking up on sweet treats. But be wary, you never know what horrors are lurking around the corner, or in your computer! We’ve rounded up some spooky stories</p>
<p>The post <a href="https://www.probado.co.uk/spooky-stories/">Spooky Stories: Horror Stories from the World of IT</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-2854" src="https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-1536x925.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-2048x1233.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2020/10/Pumpkins-190x114.jpg 190w" sizes="auto, (max-width: 2492px) 100vw, 2492px" /><br />
It’s almost that time of year, pumpkins are being carved, costumes are being bought for (virtual) parties, and we’re stocking up on sweet treats. But be wary, you never know what horrors are lurking around the corner, or in your computer! We’ve rounded up some spooky stories from the world of IT.</p>
<h2>Invisable Attacker</h2>
<p>In a phishing scam, described by cyber security expert and bug bounty hunter, Craig Hays as the greatest password theft he’s ever seen, the culprit was somehow able to fly under the radar, undetected even by the experts. In a blog for <a href="https://medium.com/swlh/phishing-with-worms-the-greatest-password-theft-ive-ever-seen-26d6ad4658f9">Medium.com</a>, Craig explained: “A typical phishing email comes from an email address you’ve never seen before. In this attack, however, all of the phishing links were sent as replies to emails in the compromised account’s mailbox. This gave every email an inherited sense of trust.”</p>
<p>The attacker used established email trails and trusted email addresses to trick victims into clicking. The original, legitimate email thread was maintained, also using the ‘reply all’ option to ensure everybody who was involved continued to receive the messages. This disguise within a legitimate conversation allowed the hacker to reply unnoticed and become part of an existing conversation.</p>
<p>So, how did Craig stop it? “We identified a pattern in the URL of the phishing pages being linked to which we could use to block them. Then we promptly rolled out Multi-Factor Authentication to anyone who didn’t have it.”</p>
<p><a href="https://www.probado.co.uk/password-security-for-smes/">Multi-factor authentication</a> (MFA) is a vital tool to help defend against cybercriminals, this can include factors such as pin codes, biometrics or card readers, in addition to a password.</p>
<h2>Hollywood Horrors</h2>
<p>In the world of IT, even famous figures are not untouchable. McAfee revealed that a group of celebrities were being used as bait for some dangerous cyberattacks. The <a href="https://www.dailymail.co.uk/sciencetech/article-8808985/Graham-Norton-named-dangerous-celebrity-search-online-UK.html">security firm’s research</a> found that searches for big names including Ricky Gervais, Ruth Jones, and Tom Hardy were to blame for leading people to suspicious sites. Graham Norton’s name was found to be the most likely term used by hackers to lure people into clicking on unsafe sites and potentially harmful pages.</p>
<p>McAfee fellow, Raj Samani said: “&#8217;We know that online criminals use consumers’ fascination with celebrity culture to drive unsuspecting fans to malicious websites that install malware on their devices. As cybercriminals continue to implement deceptive practices such as fake sites claiming to offer free content, it is crucial that fans stay vigilant about protecting their digital lives and think twice before clicking.”</p>
<h2>Scary Speakers</h2>
<p>Smart speakers and other devices are now <a href="https://www.probado.co.uk/internet-of-things/">commonplace in the home</a>, but are they getting a little too comfortable? Back in 2018, Amazon received numerous reports that their Alexa smart speakers were laughing at random times, completely unprompted. The scary chuckle was freaking out users across the world. Amazon has since explained that the device was mishearing what it believed to be the command, ‘Alexa, laugh’ and acting on that. The company has since reprogrammed the speakers to respond to the phrase, ‘Alexa, can you laugh?’ a clearer command with less chance of being misinterpreted.</p>
<p>An <a href="https://www.theverge.com/circuitbreaker/2018/3/7/17092334/amazon-alexa-devices-strange-laughter">Amazon spokesperson</a> said: “We are also changing Alexa’s response from simply laughter to ‘sure, I can laugh’ followed by laughter.”</p>
<p>We hope these spooky stories from the world of IT have got you in the Halloween mood, but remember there is a moral to every story. Whether that be to enable Multi-Factor Authentication or to be wary of inviting robots into your home, our team is here to help with any scary IT issues that may arise, get in <a href="https://www.probado.co.uk/contact-probado/">touch here</a>.</p>
<p>The post <a href="https://www.probado.co.uk/spooky-stories/">Spooky Stories: Horror Stories from the World of IT</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/spooky-stories/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Top five cyber security tips for manufacturers</title>
		<link>https://www.probado.co.uk/manufacturing-cyber-tips/</link>
					<comments>https://www.probado.co.uk/manufacturing-cyber-tips/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Fri, 25 Sep 2020 09:29:18 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[Manufacturing]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2840</guid>

					<description><![CDATA[<p>The manufacturing industry has seen a myriad of exciting tech developments in the last few years, helping to aid productivity, efficiency, and the overall capabilities of a business. But all this new tech can cause cyber security concerns to arise. Manufacturing continues to be a target for</p>
<p>The post <a href="https://www.probado.co.uk/manufacturing-cyber-tips/">Top five cyber security tips for manufacturers</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-2842" src="https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1-1536x925.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1-2048x1233.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2020/09/Soldering-2492x1500-1-190x114.jpg 190w" sizes="auto, (max-width: 2492px) 100vw, 2492px" /></p>
<p>The manufacturing industry has seen a myriad of exciting tech developments in the last few years, helping to aid productivity, efficiency, and the overall capabilities of a business. But all this new tech can cause cyber security concerns to arise.</p>
<p>Manufacturing continues to be a target for cyber-attackers, and with <a href="https://www.makeuk.org/insights/reports/cyber-security-for-manufacturing">45% of manufacturers</a> feeling like they don’t have access to the right tools to protect themselves from a cyber-attack, it is now more important than ever that manufacturers put procedures in place. We’ve rounded up our top five manufacturing cyber tips to help keep your business as cyber safe as possible.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-2843" src="https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph.jpg" alt="" width="2492" height="1717" srcset="https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph-300x207.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph-1024x706.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph-768x529.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph-1536x1058.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph-2048x1411.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph-160x110.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph-87x60.jpg 87w, https://www.probado.co.uk/wp-content/uploads/2020/09/Espionage-graph-190x131.jpg 190w" sizes="auto, (max-width: 2492px) 100vw, 2492px" /></p>
<p><a href="https://cerasis.com/manufacturing-and-cyber-security/">Source: Cerasis</a></p>
<h2>1. Ensure All Employees Have Cyber Security Training</h2>
<p>It is vital that all members within your team receive regular cyber security training. When dealing with high tech equipment on a daily basis, it is crucial that employees are comfortable using certain tech and can identify and report any cyber security concerns quickly and efficiently. Being familiar with the technology and operating systems that are being used will ensure anything out of the ordinary can be flagged and dealt with in the correct way.</p>
<h2>2. Update Your Protection Software</h2>
<p>While it may seem obvious to install antivirus programmes, it is vital that all internet connected devices within a network are protected. Make sure antivirus software and intrusion detection software are <a href="https://www.probado.co.uk/security-and-software-updates/">regularly updated</a> and deployed across your network. Automate this process where possible to make sure updates are done as soon as possible. It is important that any updates are done quickly as these will plug any holes or fix any errors that have been found.</p>
<h2>3. Don’t Forget Your IIOT</h2>
<p>Industrial Internet of Things (IIOT) technologies are becoming commonplace in most UK manufacturing businesses. Whether you’ve got large pieces of machinery, connected sensors, or personal protection wearable devices, they all must be protected. These devices can often be forgotten when considering cyber security. We suggest adopting the mindset of if it’s got an internet connection, it can be hacked and therefore needs protecting!</p>
<h2>4. Back Up Key Data and Programmes</h2>
<p>In the event that a breach or error should occur, it is important that all files, data, and operating programmes are backed up and able to be recovered. In the manufacturing industry, data loss can bring your business to a halt, causing expensive downtime. Making sure everything is backed up and accessible should the worst happen could save a lot of time and money. We suggest you consider opting for an <a href="https://www.probado.co.uk/what-are-data-centres/">external data centre</a>, these can be managed by an expert company and can keep your data safe should your network be accessed.</p>
<h2>5. Think Like a Hackers</h2>
<p>When it comes to manufacturing cyber tips, we recommend putting yourself in the shoes of a hacker. This may sound strange, but the best way to protect yourself from a hacker is to understand their motivations. Look at your business and identify any key areas, devices, or assets that would be of interest to a hacker. Cybercriminals are generally inspired by financial gains, so any data containing personal information, customer records, or actual cash is what they’ll be after. We recommend setting up <a href="https://www.probado.co.uk/password-security-for-smes/">multi-factor authentication</a> as well as restricting access to just those employees who require it. These actions will help limit the opportunities for accessing valuable data and add an extra layer of protection.</p>
<p>Here at Probado, we regularly work with manufacturers to ensure their systems are safe and can operate at the highest level <a href="https://www.probado.co.uk/cyber-security-across-multiple-sites/">across all sites</a>. For more manufacturing cyber tips, check out our blog on <a href="https://www.probado.co.uk/manufacturing-cyber-security-risks/">how to avoid manufacturing security risks</a>.</p>
<p>The post <a href="https://www.probado.co.uk/manufacturing-cyber-tips/">Top five cyber security tips for manufacturers</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/manufacturing-cyber-tips/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>A guide to ethical hacking</title>
		<link>https://www.probado.co.uk/guide-to-ethical-hacking/</link>
					<comments>https://www.probado.co.uk/guide-to-ethical-hacking/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Mon, 13 Jul 2020 13:57:46 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[Ethical hacking]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2771</guid>

					<description><![CDATA[<p>The term ‘hacking’ is often associated with cybercriminals and those who will take advantage of your every click. However, there is a type of hacker that can be your friend and will help protect you and your business. This practice is called ethical hacking. Big brands, including</p>
<p>The post <a href="https://www.probado.co.uk/guide-to-ethical-hacking/">A guide to ethical hacking</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-2769" src="https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500-1536x925.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500-2048x1233.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2020/07/Keyboard-2492x1500-190x114.jpg 190w" sizes="auto, (max-width: 2492px) 100vw, 2492px" /><br />
The term ‘hacking’ is often associated with cybercriminals and those who will take advantage of your every click. However, there is a type of hacker that can be your friend and will help protect you and your business. This practice is called ethical hacking. Big brands, including Facebook, employ ethical hackers to help keep them safe. But just what is ethical hacking, and can your business benefit?</p>
<h2>Spot the difference</h2>
<p>While they sound similar and are both practices using the same techniques, ethical and unethical hacking should not be confused. An ethical hacker is legitimately hacking your system to find any issues or areas of weakness. Unethical hackers are hacking your system to cause trouble, steal data and/or information or to try and extort funds from your business. The use of ethical hacking can actually prevent unethical hackers from gaining access to your network and devices.</p>
<p>A common misconception with ethical hacking is the legality behind it, many individuals believe that hacking of all types is an illegal practice. However, that is not the case. Ethical hacking is perfectly legal. <a href="https://www.itgovernance.co.uk/ethical-hacking">IT Governance</a> explains that ethical hackers ‘have the same knowledge and tools as a criminal hacker, but their work is conducted in a lawful manner’.</p>
<h2>Why do it?</h2>
<p>It may sound counterproductive, employing people to hack your business. However, this can be a crucial defence mechanism in protecting your business. Ethical hackers will notify you of any weak spots, unprotected areas, or easy ways that malicious hackers can take advantage of and gain access to your network. This will allow you to patch these holes and add technical armour to any areas of weakness before a product goes to market or a system into use. Ethical hacking does what it says on the tin, it is the practice of hacking systems and devices in an ethical manner. It can also be referred to as <a href="https://www.probado.co.uk/cyber-security-jargon/">penetration testing</a>, trying to penetrate a system to test its defences.</p>
<p>Ethical hacking has been around since the early days of the internet. According to <a href="https://medium.com/@TheFarmanShekh/examples-of-ethical-hacking-how-hacking-can-improve-our-lives-fbf6ec1c9b1d#:~:text=The%20practice%20of%20breaking%20into,to%20discover%20its%20weak%20points">Medium.com</a>, the United States Air Force used ethical hacking procedures to evaluate the security of an operating system which unearthed some vulnerable software and hardware. This then allowed them to fix the problem before the system was put into use.</p>
<h2>Covering all bases</h2>
<p>When engaging an ethical hacker, it is important that you have a clear brief. Be sure to specify which devices you wish to be tested or if it is the full network. We recommend testing the entire network, your individual devices may be secure but when operating with a company-wide network it is vital that all devices, systems, and applications are safe. Your business is only as strong as your weakest device or system.</p>
<p>If that still sounds too good to be true, check out Packt’s examples of successful ethical hacking missions <a href="https://hub.packtpub.com/10-times-ethical-hackers-spotted-a-software-vulnerability-and-averted-a-crisis/">here</a>.</p>
<p>If you have any questions, please <a href="https://www.probado.co.uk/contact-probado/">get in touch</a> with a member of our team.</p>
<p>The post <a href="https://www.probado.co.uk/guide-to-ethical-hacking/">A guide to ethical hacking</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/guide-to-ethical-hacking/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Keeping data secure when working from home</title>
		<link>https://www.probado.co.uk/keeping-data-secure-working-from-home/</link>
					<comments>https://www.probado.co.uk/keeping-data-secure-working-from-home/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Thu, 02 Jul 2020 17:00:21 +0000</pubDate>
				<category><![CDATA[Coronavirus]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Passwords]]></category>
		<category><![CDATA[Remote Working]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[Keeping data secure]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2759</guid>

					<description><![CDATA[<p>Keeping data secure is one of the main concerns companies and individuals are faced with when working remotely. With almost 50% of the population now working from home, it is essential that security programs and policies are both capable enough and sustainable enough to ensure that data</p>
<p>The post <a href="https://www.probado.co.uk/keeping-data-secure-working-from-home/">Keeping data secure when working from home</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-2741" src="https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops-1536x925.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops-2048x1233.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2020/07/2-laptops-190x114.jpg 190w" sizes="auto, (max-width: 2492px) 100vw, 2492px" /><br />
Keeping data secure is one of the main concerns companies and individuals are faced with when working remotely. With almost 50% of the population now working from home, it is essential that security programs and policies are both capable enough and sustainable enough to ensure that data remains safe. Even following a return to normal working conditions, lots of companies may use the success of home working during lockdown to implement a more flexible and accessible remote working policy going forward.</p>
<p>While it is vital that we are keeping data secure throughout the pandemic, it is an ongoing necessity. Ensuring that remote working is as safe as can be for both employees and companies is essential to implementing successful remote working strategies both now and in the future.</p>
<p>For those who have already adopted remote working, robust data security policies may already be in place. However, many companies have not worked this way before, at least not on this scale, or may have only just begun to dip their toes into the remote working pool, meaning that their security best practices may still be in the initial phases of development.</p>
<p>The main thing to consider when taking operations remotely, in any scenario, is training. The key to keeping data secure is ensuring all employees are comfortable with the systems they are using, they understand the importance of security measures and best practices, are able to spot anything that may be suspicious or out of the ordinary, and know how to report or solve any problems that arise.</p>
<p>When employees are out of the office it is vital that they feel comfortable with these processes without the immediate, on-site assistance of their IT teams or line managers. Make sure that all staff have received up-to-date training and are happy with their new remote set up.</p>
<p>Ensure that all devices being used to access company data have up-to-date antivirus software installed on them and automate any updates if you can. Making sure that updates are done as quickly as possible help to patch any holes or weak spots in previous versions and can be essential for preventing a data breach.</p>
<p>A great option for keeping your data secure while preserving remote access is by using a data centre. Data centres are a terrific option and can come with a range of additional security benefits, such as specialist physical 24/7 security. As well as being able to access data remotely, data centres allow for the deployment of firewalls and antivirus software across your entire network. You can read more about data centres here.</p>
<p>Another thing to consider when working remotely is using a secure connection. While it is easier in these current times to avoid public spaces and unsafe public WiFi connections, the security of your connection is still important. Ensure your WiFi is password protected and you can control who has access to the network.</p>
<p>We would highly recommend using a virtual private network (VPN). A VPN is essentially a secure passage for you to access the world wide web. Cybercriminals will look to exploit a range of areas, so it is important that your browsing and online activity is protected.</p>
<p>Keeping data secure needn’t be a worry for your business, our team are still working remotely and are available to help you with any issues that may arise when working from home. Whether you’re struggling to keep the connection or need some advice on how to implement these strategies on a longer-term basis then please get in touch with a member of our team.</p>
<p>The post <a href="https://www.probado.co.uk/keeping-data-secure-working-from-home/">Keeping data secure when working from home</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/keeping-data-secure-working-from-home/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cyber security jargon you need to know</title>
		<link>https://www.probado.co.uk/cyber-security-jargon/</link>
					<comments>https://www.probado.co.uk/cyber-security-jargon/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Thu, 28 May 2020 12:39:57 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[Cyber security jargon]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2735</guid>

					<description><![CDATA[<p>Cyber security jargon can be confusing. However, securing your systems needn’t be a big, confusing job and our team is here to support you every step of the way. We’ve compiled some of the most common cyber security jargon to help you get to grips with how</p>
<p>The post <a href="https://www.probado.co.uk/cyber-security-jargon/">Cyber security jargon you need to know</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-2729" src="https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1-1536x925.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1-2048x1233.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2020/05/Code2-2492x1500-1-190x114.jpg 190w" sizes="auto, (max-width: 2492px) 100vw, 2492px" /><br />
Cyber security jargon can be confusing. However, securing your systems needn’t be a big, confusing job and our team is here to support you every step of the way. We’ve compiled some of the most common cyber security jargon to help you get to grips with how to keep your systems safe.</p>
<h2>1. Hacker</h2>
<p>The word hacker can instantly conjure up images of masked criminals using complex codes to steal data from a computer. While the term ‘hacker’ is correct for this individual it is also a wider term used to describe those who possess the skills to gain unauthorised access to computer systems. These are not necessarily bad guys. Many software and tech companies actually employ hackers to test software and identify areas of weakness so they can be fixed.</p>
<h2>2. Phishing</h2>
<p>Not to be confused with the pastime using bait and rods, phishing is a term for an online scam. Merriam-Webster defines phishing as a ‘scam by which an internet user is duped into revealing personal or confidential information which the scammer can use illicitly’. A common example of this is a fraudulent email pretending to be a bank aiming to obtain bank details to then hack, blackmail or steal money.</p>
<h2>3. Malware</h2>
<p>The clue to malware is in the name, ‘mal’ comes from malicious and ‘ware’ from software. Malware is just that, malicious software. Viruses, spyware and Trojan horses are all various types of malware and should be protected against as much as possible. The easiest way to protect against malware is to simply be careful online. Be wary of unusual emails, strange pop-ups and alerts, and odd-looking downloads.</p>
<h2>4. Patching</h2>
<p>Patching can mean a number of different things, including fixing the hole in that old pair of jeans! When it comes to cyber security, patching is a very similar process. The National Cyber Security Centre defines patching as ‘applying updates to devices or software to improve security and/or enhance functionality’’.</p>
<h2>5. Encryption</h2>
<p>The term encryption gets thrown around a lot when it comes to cyber security, but do you know what it actually means? According to Tom’s Guide, encryption refers to ‘a process used to make sensitive data more secure’. This means converting the data into a code that wouldn’t make sense to most. Another term that you should be aware of is cryptography. This is the term for the science behind encrypting and decrypting data.</p>
<h2>6. VPN</h2>
<p>A VPN, or Virtual Private Network, is a way to safely surf the web on a public internet connection. A VPN hides your IP (internet protocol) address so that your online activities are hidden from view and safe on a potentially harmful network. Online security firm Norton describes the process as a ‘data tunnel between your local network and an exit node in another location’.</p>
<h2>7. Firewall</h2>
<p>Forcepoint defines a firewall as ‘a network security device that monitors incoming and outgoing traffic’. A firewall has the ability to block or deny access to any traffic that is deemed harmful or seems a little bit ‘phishy’. Think of it as a security guard for your device, monitoring anything attempting to gain access.</p>
<h2>8. Ransomware</h2>
<p>Ransomware is a type of malware designed to lock users out of devices or accounts and effectively hold them for ransom. Hackers will demand money or something else of value to allow the user to regain access again to their device or account. Ransomware can enter a device through a comprised website or a dodgy download. This is why firewalls and antivirus software are so important as they can attempt to stop these harmful files before they gain access.</p>
<h2>9. Clickjacking</h2>
<p>Clickjacking is a particularly sneaky way that hackers (the bad kind) will get a user to download malware or inadvertently click through to a harmful website. This is done by disguising an element on a web page as something else or creating an invisible element that users won’t even realise is there. A form of clickjacking is ‘likejacking’, which according to Imperva is a ‘technique in which the Facebook like button is manipulated, causing users to like a page or post they did not intent to’.</p>
<h2>10. Pen-testing</h2>
<p>Short for ‘penetration testing’, pen-testing can also be referred to as ethical hacking. This is a process where trained hackers will attempt to penetrate a system to look for weaknesses that cyber criminals could potentially manipulate. Described by ITGovernance.co.uk as ‘a controlled form of hacking’ pen-testing is a great way to test systems, updates, firewalls and overall security. Many companies will employ ethical hackers that will regularly attempt to access systems to ensure that they are on top of their cyber security and can patch any holes as quickly as possible!</p>
<p>When it comes to cyber security jargon there can be a lot of confusion, so it’s no surprise that users get confused and put off and end up leaving themselves at risk. However, the majority of problems can usually be fixed by ensuring staff training is up to date. With all the jargon and ever-evolving systems and technology, educating staff on key skills and processes is often missed. A business could have the best tools and the most expensive systems but if staff don’t know how to properly use these systems and aren’t aware of potential treats and how to report them, the door could be left wide open.</p>
<p>Here at Probado we aim to avoid the techno-babble and ensure you know exactly what is going on with your IT and how to operate it. If you’re unsure about some cyber security jargon or would like to know more about our training packages, get in touch with a member of our team here.</p>
<p>The post <a href="https://www.probado.co.uk/cyber-security-jargon/">Cyber security jargon you need to know</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/cyber-security-jargon/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to avoid manufacturing cyber security risks</title>
		<link>https://www.probado.co.uk/manufacturing-cyber-security-risks/</link>
					<comments>https://www.probado.co.uk/manufacturing-cyber-security-risks/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Wed, 01 Apr 2020 13:58:35 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Firewalls]]></category>
		<category><![CDATA[What's On]]></category>
		<category><![CDATA[Cyber security risks]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2681</guid>

					<description><![CDATA[<p>All manufacturers want to protect their equipment, employees and customers from cyber security risks, but what is the best way? The reality is there is no secret formula to ensure safety but there are ways to better the odds. Here are the top things to consider when</p>
<p>The post <a href="https://www.probado.co.uk/manufacturing-cyber-security-risks/">How to avoid manufacturing cyber security risks</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-2679" src="https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot.jpg" alt="" width="2492" height="1500" srcset="https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot.jpg 2492w, https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot-300x181.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot-1024x616.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot-768x462.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot-1536x925.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot-2048x1233.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot-160x96.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot-100x60.jpg 100w, https://www.probado.co.uk/wp-content/uploads/2020/04/Manufacturing-robot-190x114.jpg 190w" sizes="auto, (max-width: 2492px) 100vw, 2492px" /><br />
All manufacturers want to protect their equipment, employees and customers from cyber security risks, but what is the best way? The reality is there is no secret formula to ensure safety but there are ways to better the odds. Here are the top things to consider when looking at how to avoid manufacturing cyber security threats and stay as safe as possible.</p>
<h2>1. Training</h2>
<p>Training is vital for all staff. You wouldn’t send a footballer on to the pitch with no knowledge of the game, so why would you allow employees to use computers and computerised equipment without basic cyber security training?</p>
<p>Whether staff are using an email account or operating a complex piece of machinery, training them to be able to identify suspicious activity and report it to the correct member of staff could save your business thousands or even millions. Consider the long-term impact a breech might have on your hard-earned brand the potential impact in your supply chain(s).</p>
<h2>2. Antivirus and firewalls</h2>
<p>It may seem like a simple step but ensuring you have antivirus software and firewalls installed across your network is one of the best (and easiest) ways to protect your business from a cyber-attack. Such software can be deployed from across the entire network with ease, a small price to pay.</p>
<p>Ensure all your antivirus software (as well as other general apps and programmes) are updated as and when required. We know those update pop-ups can be irritating, however, ignoring them could come at a huge risk. Updates are there to plug holes and improve performance. If a programme, device or application is not updated when required it could leave a gap for hackers and other cyber criminals to access your network.</p>
<p>Make sure all updates are done as soon as they can be and auto enable them where possible.</p>
<h2>3. Access and passwords</h2>
<p>Only give access where necessary, it is not a matter of trust, if someone’s login gets comprised, cybercriminals could potentially gain access to the entire network. Only give staff access to server areas, equipment and files that they need to do their jobs properly. Additional access can be granted at a further date but restricting access where it isn’t needed is a great start to minimise risk.</p>
<p>Physical access also benefits from being restricted. If everyone on site has a master key to all areas, should one get lost or into the wrong hands the entire facility is at risk. Be mindful when granting access, again this can always be modified at a later date should an employee’s requirements and remits change.</p>
<p>Having strong passwords is key, not just for manufacturers but for everyday life. Avoid using the same passwords for multiple accounts as well as easy to guess passwords such as ‘password’ or ‘12345’. Implementing multi-factor authentication (MFA) is also a good option. MFA grants access after two or more ‘factors’ are fulfilled. Some common MFA factors are:</p>
<p>• Password<br />
• Additional pin number<br />
• Fingerprint<br />
• Additional device or key<br />
• Voice recognition</p>
<h2>4. New technologies</h2>
<p>Another step to take to prevent any cyber security risks is by ensuring your Wi-Fi connection is secure is essential. This is not just for emails and browsing on the web, with many manufacturers now implementing internet of things (IoT) technologies into their processes, internet security is more important than ever.</p>
<p>A joint Ponemon Institute and Shared Assessments report showed that less than 20% of risk professionals could identify all IoT devices within their organisations. Ensure your IT team is aware of any new devices, however big or small. Think of it this way, if it has an internet connection, it can be hacked or manipulated.</p>
<h2>5. Supply chain</h2>
<p>If you work within a supply chain, then you definitely need to bear in mind the security of each business in the chain. While the majority may be on top of their security, if one is lacking then they pose a risk to all in the network. A supply chain is only as strong as its weakest link.</p>
<p>Supply chains are becoming increasingly desirable to cyber criminals as there are ultimately more users and data to target. There are however some simple steps businesses can take to minimise the risk:</p>
<p>• Perform a cyber risk audit at the beginning of new business relationships.<br />
• Conduct regular reviews of everyone’s cyber security.<br />
• If you notice a risk or area of weakness, inform other businesses as a matter of urgency.<br />
• If your business experiences a breach, notify all parties in the supply chain as soon as possible.</p>
<p>For more information on how to protect your manufacturing business from cyber risks, get in touch with our team here.</p>
<p>The post <a href="https://www.probado.co.uk/manufacturing-cyber-security-risks/">How to avoid manufacturing cyber security risks</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/manufacturing-cyber-security-risks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to maximise cyber security across multiple manufacturing sites</title>
		<link>https://www.probado.co.uk/cyber-security-across-multiple-sites/</link>
					<comments>https://www.probado.co.uk/cyber-security-across-multiple-sites/#respond</comments>
		
		<dc:creator><![CDATA[steve]]></dc:creator>
		<pubDate>Wed, 11 Mar 2020 01:08:49 +0000</pubDate>
				<category><![CDATA[Cloud Storage]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Security Updates]]></category>
		<category><![CDATA[What's On]]></category>
		<guid isPermaLink="false">https://www.probado.co.uk/?p=2667</guid>

					<description><![CDATA[<p>Large manufacturers often have multiple sites and complex supply chains which increases potential vulnerabilities when considering cyber security risks. But knowing how to maximise cyber security across your multiple manufacturing sites will help prevent any breaches and keep your data and processes safe. According to Computer Weekly,</p>
<p>The post <a href="https://www.probado.co.uk/cyber-security-across-multiple-sites/">How to maximise cyber security across multiple manufacturing sites</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-2671" src="https://www.probado.co.uk/wp-content/uploads/2020/03/science-in-hd-i4ABHj811N0-unsplash-scaled.jpg" alt="" width="2560" height="1761" srcset="https://www.probado.co.uk/wp-content/uploads/2020/03/science-in-hd-i4ABHj811N0-unsplash-scaled.jpg 2560w, https://www.probado.co.uk/wp-content/uploads/2020/03/science-in-hd-i4ABHj811N0-unsplash-300x206.jpg 300w, https://www.probado.co.uk/wp-content/uploads/2020/03/science-in-hd-i4ABHj811N0-unsplash-1024x704.jpg 1024w, https://www.probado.co.uk/wp-content/uploads/2020/03/science-in-hd-i4ABHj811N0-unsplash-768x528.jpg 768w, https://www.probado.co.uk/wp-content/uploads/2020/03/science-in-hd-i4ABHj811N0-unsplash-1536x1056.jpg 1536w, https://www.probado.co.uk/wp-content/uploads/2020/03/science-in-hd-i4ABHj811N0-unsplash-2048x1408.jpg 2048w, https://www.probado.co.uk/wp-content/uploads/2020/03/science-in-hd-i4ABHj811N0-unsplash-160x110.jpg 160w, https://www.probado.co.uk/wp-content/uploads/2020/03/science-in-hd-i4ABHj811N0-unsplash-87x60.jpg 87w, https://www.probado.co.uk/wp-content/uploads/2020/03/science-in-hd-i4ABHj811N0-unsplash-190x131.jpg 190w" sizes="auto, (max-width: 2560px) 100vw, 2560px" /><br />
Large manufacturers often have multiple sites and complex supply chains which increases potential vulnerabilities when considering cyber security risks. But knowing how to maximise cyber security across your multiple manufacturing sites will help prevent any breaches and keep your data and processes safe.</p>
<p>According to Computer Weekly, almost half of UK manufacturers have experienced a cyber security incident, with Enscite also reporting that the manufacturing sector is the third most hit by cyberattacks in the UK.</p>
<p>Managing cyber security risks on just one site can be challenging let alone at multiple locations. Here is everything you need to consider to ensure all your manufacturing sites are as cyber-safe as possible.</p>
<h2>Have a dedicated team</h2>
<p>Most manufacturers will have a dedicated IT or cyber security team; however, they may only be based in the head office or one central location. Having a dedicated member of staff on each site (or at the very least, regular visits and audits) is crucial to being able to identify cyber security risks, data breaches or weak spots and manage them effectively and quickly.</p>
<p>There are many cyber-attacks that can lay undetected to the untrained eye until it is too late. It can take companies over six months to identify a data breach, therefore having specialist staff on the ground at each location can ensure that any breaches are identified and dealt with as soon as possible.</p>
<h2>Provide training for all employees – your first and last line of defence</h2>
<p>Training is essential for ensuring cyber security across multiple manufacturing sites. Providing training just for your IT team is not enough – all staff need to be trained in basic cyber security, covering everything from how to identify a spam email to the reporting procedure in your organisation. Whether they’re working with a single email account or a specialist piece of computer operated equipment, cyber security training is essential.</p>
<p>It is not always possible for the IT team to be on hand 24 hours a day but if all staff are vigilant and aware of what to look out for, it can help protect not just their site, but the entire network including admin systems, manufacturing equipment, specialist software and customer data.</p>
<h2>Be vigilant with technology</h2>
<p>More and more manufacturers are investing in artificial intelligence, robotics, Internet of Things (IoT) technologies and Industry 4.0. These are incredible developments in the manufacturing sector that can provide significant value to manufacturing sites and end products alike.</p>
<p>However, with great connectivity comes greater cyber security risk. The more devices that are connected to the internet and are controlled via automated technology, the more targets there are for hackers and cyber criminals. Ensure your entire network is covered by firewalls, anti-virus software and is password protected. Multi-factor authentication (including biometrics) is a great step to enforce, adding an extra layer of protection to devices, accounts and equipment.</p>
<h2>Be equal across sites</h2>
<p>Ensure all sites have the same level of cyber security in place. If one site has a weak spot, hackers can manipulate this to gain access to the entire network covering all locations. While manufacturers will want to invest in tools and equipment to improve the work they produce and the value they can give to customers, investing in cyber security programmes, equipment and training is just as important.</p>
<p>This will not only protect your business but also your customers’ information. With almost 60% of customers asking for proof of the robustness of a manufacturer’s cyber security system, its importance can’t be ignored. Having an even blanket of protection over all sites means that each base and each customer has the best possible chance at avoiding a cyber-attack.</p>
<p>We work with a number of manufacturing businesses across a variety of sectors to ensure their work across multiple sites is as safe as possible. If you’re looking to improve the cyber security of your manufacturing sites, get in touch with a member of our team here.</p>
<p>The post <a href="https://www.probado.co.uk/cyber-security-across-multiple-sites/">How to maximise cyber security across multiple manufacturing sites</a> appeared first on <a href="https://www.probado.co.uk">IT Support Services in Huddersfield, Yorkshire</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.probado.co.uk/cyber-security-across-multiple-sites/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
