Jade Whelan, Author at Rio IT
GET IN TOUCH
Are These Cybersecurity Skeletons Hiding in Your Closet?

Jade Whelan

Are These Cybersecurity Skeletons Hiding in Your Closet?

Posted on

Let’s dive into a topic that might give you the chills – cybersecurity skeletons in the closet. You may not have old skeletons hidden away in the basement, but there’s a good chance of cybersecurity vulnerabilities lurking in the shadows. You can’t fix what you can’t see. It’s time to shine a light on these hidden dangers so you can take action to protect your business from potential cyber threats. These are some of the most common cybersecurity issues faced by SMEs today and the easiest ways to deal with them. The cobweb-covered nightmare – Outdated software. When software vendors… Read More

How to Protect Your Business Against Social Engineering

Posted on Tags: ,

Roughly 98% of cyber-attacks rely on social engineering. Whilst social engineering itself isn’t a cyber-attack, it helps cyber-criminals gain the trust of potential victims, which encourages them to lower their guard and take unsafe action, such as clicking links or opening malicious attachments. Most data breach incidents will target the human element to gain access to sensitive information. One of the greatest dangers of social engineering is that only one user needs to be fooled to provide enough information to trigger an attack that has the potential to bring down an entire organisation. Over time social engineering attacks have become… Read More

SaaS Ransomware & How to Defend Against It

Posted on

Software-as-a-Service (SaaS) has revolutionised the way businesses work. Collaboration in the Cloud makes it easy for everyone to work together and access the files they need from any device, anywhere they have an internet connection. However, like all technologies, alongside the benefits, SaaS also brings potential threats. When software and data are online, they are vulnerable to attack. As more businesses move their applications and data to the Cloud, cybercriminals are following suit. Between March and May 2023, SaaS attacks rose by over 300%, and in 2022, 51% of ransomware attacks targeted SaaS data. So, what is SaaS Ransomware, and… Read More

Cybersecurity Awareness Month: Securing the Basics

Posted on

As technology continues to advance, so does the need for greater cybersecurity awareness. Cybersecurity isn’t just a job for the IT team, everyone can, and should, play a part in keeping your business’ data safe. October is Cybersecurity Awareness Month. This year the focus for this initiative is going back to basics on four key best practices of cybersecurity: By ensuring you have the basics nailed down, you’re building a strong foundation to build your cybersecurity strategy. Enable Multi-Factor Authentication (MFA) Multi-factor authentication adds a vital layer of security to all logins. In most cases cybercriminals can’t breach an account… Read More

What is a zero-trust model?

Posted on

As business and technology continue to evolve, so do cyber threats. A zero-trust model can help you stay protected, by using a simple concept – “never trust, always verify”

Mobile Malware: How to Prevent A Breach

Posted on

During the first few months of 2022, cybersecurity researchers discovered that mobile malware attacks had risen by 500% . This is concerning not only because of the scale, but because it shows that many people still aren’t protecting their smartphones. Over the years, mobile phones have become more powerful, and they can now perform many of the same functions as a laptop or PC. Despite this, many people don’t protect their smartphones in the same way they protect their computers. Over 60% of digital fraud now occurs through mobile devices, which means they carry a lot of risk if they’re… Read More

Keeping Up with Cybersecurity Insurance Policies

Posted on

For SMEs cybersecurity insurance is still a relatively new idea. It was initially introduced in the 1990s to cover large enterprises against things like data processing errors and online media. Over time, the policies for cybersecurity coverage have changed, and now they can cover the typical costs of a data breach, including remediating a malware infection or compromised account. Other costs typically covered by cybersecurity insurance include: Recovering compromised data IT forensics to investigate the breach Legal expenses Ransomware payments It is anticipated that data breaches will continue to increase in both volume and cost throughout 2023. Many small businesses… Read More

Microsoft Support for Windows Server 2012 and Server 2012 R2 Ends October 2023

Posted on

Whenever Microsoft release a new product, whether it’s a new version of Windows, Office or Windows Server, this product has a limited time that it will be supported. Generally, Microsoft will continue to provide support, such as security and feature updates, for roughly 7 years , and then will start to phase out the product in favour of new technologies. In line with this process, Microsoft has now announced that support for Windows Server 2012 and Server 2012 R2 will end on 10th October 2023. This means from October 11th Microsoft will no longer release updates to servers running on… Read More

VoIP Setup Tips for a More Productive Office in 2023

Posted on

With the news that BT will be switching off all analogue lines in 2025 and the way that the pandemic pushed businesses into operating remotely, more businesses are turning to Voice over IP (VoIP) telephone systems. VoIP allows employees to answer the business from any internet-connected device, in any location, while clients and prospective customers will never know the difference. If that isn’t enough of a benefit, according to Microsoft 82% of organisations have reported saving money after implementing VoIP. While VoIP is certainly the way forward for business, it’s not necessarily foolproof. If your VoIP system isn’t set up… Read More