Posts

1.28 billion. That’s how many tablet users there are expected to be worldwide this year. To put that into perspective, India’s population is just over 1.38 billion. Tablets are growing in popularity. And as they become more powerful, it’s only a matter of time until they become more integral in our workplaces. They’re already a huge part of many industries. Charity retail shops, for example, use tablets alongside their EPoS system to streamline operations.

But as their popularity rises, it’s essential we keep take a look at our tablet security. They contain sensitive information and, like any device, can be hacked. So is your tablet as safe as it can be? Take our quiz to find out…

Q1. Tablets, unlike other devices, don’t need antivirus. It’s secure enough without it.

  1. True
  2. False

Q2. You can wait to install updates on your tablet.

  1. True
  2. False

Q3. Passwords should be 12 characters minimum.

  1. True
  2. False

Q4. How safe is it to connect to an unknown Wi-Fi?

  1. It’s never completely without risk
  2. As long as it’s public Wi-Fi like Starbucks, it’s fine
  3. It’s fine, I do it all the time

Answers 

Question 1 – This is false. Even though some see Apple devices as extremely secure, they’re just as vulnerable as Android tablets. In fact, rates of iOS malware have been increasing over the years. So, just like a PC or laptop, antivirus protection is a necessity.

Question 2 – Also false. Any updates on your tablet should be installed immediately, especially if they’re patch updates. These will ensure your security is as current as possible, protecting against more recent cyber threats.

Question 3 – True. With passwords, the general rule is the longer the better. But a password of 12 or more characters is a great place to start. Follow the regular advice and mix letters, numbers, and symbols.

Question 4 – It would be amazing if we could trust any Wi-Fi. But that’s too good to be true. One of the more common public Wi-Fi attacks is known as a man-in-the-middle attack. When a device connects to the internet, a hacker can easily position themselves between these transmissions and access your information.

Many people think the standards we hold our computers to don’t apply to other devices. But any device we own can easily be exploited. Just this idea that tablets and similar devices don’t need the same protection could be putting you and your data at risk. It’s vital we prioritise cyber security across all devices to protect our data – look after your tablet security.

Keep yourself secure. If you’re in the charity sector, we’ll be at the Charity Retail Association Conference on the 9th and 10th of September, launching CHARiot Web. With our newest cloud-based EPoS solution, your staff and volunteers can stay as safe as possible. Come see us at our stand or call us today on 01204 706 000.

Choosing an EPoS system is a big decision for many businesses. There are many factors to consider, such as reporting features, payment methods, and ease of use. But what about security? Cyber attacks are rife and saw a sharp increase over the pandemic. And as an EPoS system stores a lot of sensitive data, it’s important to choose the most secure system to protect your customers, staff, and business. 

You can broadly split EPoS systems into two types: traditional and cloud-based. Each has its own pros and cons in terms of security. So is either better than the other? We weighed up the pros and cons of each to help you choose the best EPoS system for your business.

Where your data is kept

One benefit of having a traditional EPoS system is that you know exactly where your data is. Many are comforted knowing it’s on site or even stored in a location where they can control the security. But while this can be considered a pro, it can be a con too. By having your data stored on-site, it could be less protected. There’s the possibility of accidentally damaging your system or even theft.

Since cloud-based systems are off-site, there’s an extra layer of physical security for your data. And it’s not a cost that falls to you; the server host pays for the building, security, and even the hardware. It saves you money in the long run. And with over 70% of executives suffering an accidental internal breach within the past five years, storing the system off-site could help prevent this. But this will come down to personal preference and how much you trust your EPoS provider to keep your data safe – and even if they back it up.

Updates

Cloud-based EPoS systems can be regularly updated via the cloud. This means your data can stay secure as these updates should tackle new bugs, errors, or cyber threats. And it can all be done over the cloud, meaning there’s no need for a technician to actually come out to your shop.

Traditional EPoS systems might be the opposite. The physical hardware might need regular maintenance and updates might not be as frequent. Check what frequency it’s updated at, if at all. The benefit of this though is it might be a popular system, so any new starters could be familiar with it.

When it comes to traditional vs cloud-based systems, there is no one right choice. Some of the decision will come down to your personal preference. But after this past year, you need every advantage you can get. Opting for cloud-based puts you in a better spot for the future. So don’t just consider what you need now, but what you will need in the future.

At Nisyst, we know how important it is to have an EPoS that’s tailored to your needs while being as secure as possible. For anyone in the charity sector, we’ll be at the Charity Retail Association Conference on the 9th and 10th of September, where we’ll be launching our cloud-based EPoS system CHARiot Web. Come by our stand to find out more or call us today on 01204 706 000.

The pandemic wreaked havoc in many areas of our lives. And one particularly worrying trend we saw was a huge increase in cyber crime. Just last year, 26% of charities fell victim to a cyber attack, proving no one is safe.

It’s essential to keep your charity as secure as possible to protect your reputation, your donor’s information and, of course, your staff too. So here are our top six tips for improving your charity’s online security.

Regularly train your staff

Eight out of ten charities say their staff have been the targets of a phishing attack. No employee or volunteer falls victim to them on purpose. All that you can do is make sure they’re well-trained. We recommend retraining staff every four to six months as research shows that, after six months, staff begin to forget best practices. 

Change your passwords

Using long, randomised passwords, and changing them regularly, is one of the easiest and quickest ways to keep your charity secure. Aim to change them monthly. And make sure they’re complex. Many people still use names, places, and other words meaningful to them to create passwords, but these are easy to guess. Choosing a random, complex password makes it much harder for hackers to access any accounts. 

Use multi-factor authentication where possible 

Multi-factor authentication adds an extra layer of security. If, for example, you’re required to tap a number on your mobile phone to access your emails, it means only you will be able to log in. Even if cyber criminals steal your password, they’ll struggle to access your account without access to your phone.

Ensure your phone is secure

More and more of us are using our phones for work, so it’s never been more important to ensure we’re using best practices to keep our phones secure. Start by setting up a password so only you can unlock your phone. Then lock your sensitive apps with different passwords. This way, you have two layers of security.

Consider switching to a cloud-based EPoS system

Cloud-based EPoS systems are more secure than server-based systems, in part because you don’t need to keep any hardware on-site. As well as this, cloud-based systems update regularly and automatically, keeping your data safe. Switching to a cloud-based EPoS system can give you that extra peace of mind.

Prepare a response plan

Unfortunately, it’s impossible to completely prevent your charity from falling victim to a cyber attack, so it’s a great idea to have a plan for if one happens. Linking back to the last tip, another benefit of choosing a cloud-based EPoS system is that it makes it that much easier to get back up on your feet when combined with cloud backup.

As cyber criminals become increasingly sophisticated in their methods, we need to step up our online security to have a fighting chance. That’s why, at the Charity Retail Association Conference, we’ll be launching CHARiot Web. This is our cloud-based EPoS solution designed to evolve with your to keep your charity as secure as possible from cyber criminals.

Curious to see what else CHARiot Web can do for your charity? Come and visit our stand at the Charity Retail Association Conference on the 9th and 10th of September. Or, get in touch with us today on 01204 706000.

Since April 2020, almost half of all British citizens have worked from home in some capacity. It’s no surprise then that, during that time, there was an 800% surge in cyber attacks. That link is no coincidence – our home set-ups aren’t as secure as what we have in our offices. But with 98% of people preferring remote working at least part time from now on, we’re going to have a long-term issue.

With a potentially permanent cultural shift in how we work on the horizon, we have to start thinking about our home set-ups. There are many cyber risks out there – are you sure you’re ready to keep yourself safe? We’ve whipped up this quiz to test your knowledge. Write down your answers as you go along and check them against the key at the end. Good luck!

Q1. Which of the following is the definition of “phishing”?

A) A type of scam email or message with a fake link to steal your data or download malicious software.

B) A type of malware that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid.

Q2. How often should you change your password? 

A) Every week

B) Every month

C) Every two to three months 

D) Every six months 

Q3. Which encryption language should your home Wi-Fi use?

A) WEP 

B) WPA 

C) WPA2

D) WPA3

Answers

Question 1 answer – The answer is A. Phishing is the single most popular form of cyber attack. In fact, around half of all UK cyber attacks are phishing attacks. Being able to identify them is key if you’re working from home as your personal devices may not be as protected as the tech in the office.

Question 2 answer – The answer is C, every 60-90 days. Any less than that and you become much more susceptible to hacking. But you shouldn’t just change passwords regularly. They need to be strong too. Simple passwords are incredibly easy to hack and, if used across different platforms, mean you’re essentially handing your information over.

Question 3 answer – This one’s a bit of a trick question as there are two acceptable choices. The answers are in order of how secure they are. WEP is the least secure and WPA3 is the most. In an ideal world, you’d have WPA3. But WPA2 is good too. The lower the strength, the easier it is for someone to access your network. 

For many, remote working is here to stay. So it’s absolutely essential that cyber security becomes a top priority to ensure no data leakage and to protect your business from vicious malware.

Nisyst Cyber Security offers a managed endpoint security solution. This solution helps to protect you from ransomware, viruses, spyware, worms, and more. Protect your business today – call us on 01204 706000.

For almost a year now, many of us have been working from home. With the lockdown still ongoing – though potentially with the end in sight – many are still working remotely. While it might be protecting our health, we can’t forget to protect ourselves from cyber threats, too.

Right now is a great opportunity for cybercriminals. The anxiety around the virus makes people more vulnerable to phishing attacks, while work from home setups tend to have weaker security measures in place than the office. But it is not just cybercriminals causing disruption: 20% of businesses have suffered a breach due to the actions of a remote worker since lockdown began.

It is essential to stay on top of any potential threats or vulnerabilities and ensure employees understand how to stay safe. Here are three security risks you and your staff should look out for when working from home…

Insecure home setups

In an office environment, you probably have an IT manager or someone in control of the security of your network. At home, however, people typically have weaker setups. For example, their Wi-Fi connection might be WEP instead of WPA-2. This may seem unimportant, but weaker setups make it a lot easier to hack into. 

This shift could also mean people are using programs they aren’t familiar with, which can lead to further vulnerabilities. Personal devices like laptops and mobile phones may have fewer security controls, so it is best, if possible, to use work-issued devices. 

Phishing attacks

Phishing attacks are widely recognised as the top cause of data breaches. These attacks can ruin a business. On the surface, they look like normal emails. But they often link to fake websites and downloads that infect your computer. 

Over the course of the pandemic, they’ve become more sophisticated and targeted. But more than that, they’ve become more frequent; HMRC reported a 73% rise in phishing emails. The best way to protect against phishing attacks is training. Make sure all staff know the warning signs of an attempt and to check with IT managers if they aren’t sure.

Weak passwords

If something’s online, there’s a good chance someone else can get into it. It helps to make it as difficult as possible for them. Many companies work online to make work more collaborative. But too often, people reuse login details. 

Using the same login for Zoom, email, and any other online apps or websites you use to stay in contact with your team is dangerous and can result in an attacker gaining access to your accounts. Password managers can help keep track of multiple passwords and help you create stronger ones that are harder to guess.

Cyber threats are a danger to all businesses, especially while we’re working from home. It’s important to back up data, make employees aware of the various attacks and best online practices, and ensure they have the strongest setup possible while they’re working remotely. 

Put your mind at ease by protecting your business today. We pride ourselves on creating the most efficient and effective cyber security solution. For more information, get in touch with us on 01204 706000.

There was a time where our phones were just big, chunky bricks only capable of calling other people. Now they’re our digital Swiss Army knife, with cloud storage, emails, messaging, a calculator, and hundreds of apps that help us with work and so much more. But phones are only going to continue to improve and we’re going to rely on them more and more.

And with the lines between work and home life blurring, our phones have become essential tools in our jobs. Over three-quarters of the UK use their personal device for work. With this in mind, it’s critical we make sure it’s secure. With so much important information on these devices we take everywhere with us, we can easily open ourselves up to hackers and cyber attacks. So what simple ways can you look after your mobile phone security?

Lock your apps

We all know you can add a password to your phone to stop people from browsing through it, but you can also lock individual apps. This is particularly useful for those who use their phone for work and simply can’t delete sensitive files. 

This way, you can protect sensitive information with not one password (the one you use to unlock your phone) but two. Or, if you don’t want to lock your apps, you can simply log out each time to protect your information.

Install an antivirus app

We all have antivirus for our computers and laptops, so why not for our phones too? It may seem redundant as most phones already have protection against malware, but these measures sometimes just aren’t enough. 

For example, Google removes malware it finds in the Play Store. But this just tells us that malware can find a way onto the Play Store. You may download an app infected with malware before Google can remove it. Not all built-in protection is strong enough, and it’s better to be safe than sorry.

Keep Bluetooth and Wi-Fi off when you aren’t using it

Keeping either of these on essentially just opens you up to hackers. Hackers can intercept and change the data sent over Bluetooth. And, sadly, public Wi-Fi – though convenient and free – can be dangerous too. Instead of connecting to the Wi-Fi, you could be sending your data directly to a hacker. Hackers can also use unsecure public Wi-Fi to distribute malware. 

Don’t use public chargers

I’m sure this one is hard for many to hear, but it just isn’t safe. When you plug in your phone at the train station, airport, Starbucks, or wherever you are, the port doesn’t just charge your phone; it transmits data. 

A compromised charging station could give a hacker access to just about anything in your phone, including texts, emails, and photos. If you regularly find yourself low on battery when out and about, it might be time to invest in a power bank.

As we use our mobile phones more often, it’s essential that we protect the sensitive information on them. Following these tips won’t make your phone immune from cybercriminals, but they will make the chances of you falling victim to an attack much less likely.

Nisyst Cyber Security has been leading the UK tech scene for over 30 years. We can help you look after your mobile phone security. Ready to protect your business? Call us now on 01204 706 000.

It’s no surprise that cybersecurity has rocketed up many companies’ list of priorities. The number of UK businesses who fell victim to a cyberattack has majorly increased, especially in the last year. And it’s not as if the bigger the business, the safer you are; phishing attacks worked 38% of the time in large businesses compared to 29% in SMEs.

The reason for the high number of cyberattacks? Our technology makes it too easy. If cybersecurity is at the top of your agenda, so should patch management. Every piece of current software and technology is constantly releasing new patches that add new features and bolster security. But if you aren’t staying on top of them, you are just leaving yourself open to exploitation. So how can patch management ensure you and your tech stay as safe as possible?

Why you need patch management

The most obvious reason for patch management is to keep your security up to date. Bad-faith actors will use whatever holes they can find to work their way into your system. It’s also why we would never recommend you use unsupported services or operating systems. Any breach will likely cost you a lot of money and a lot more reputation.

Beyond that, staying on top of your patches keeps your whole team more productive. As well as fixing any existing security issues, updates can make software more efficient, meaning it runs faster and crashes less. Your staff won’t have to worry about any of that slowing them down. How often has your computer frozen and sent you into a mad rage? We know it’s happened more than enough to us!

Due to the significant threat, it’s also often a requirement to stay safe. Depending on your industry, staying up to date means staying compliant. Noncompliance is a rocky road to penalties and lost business. If you have personal details for clients and they end up being compromised, you put them in danger and your business in hot water.

How to implement

We make it sound like a long process, but it doesn’t have to be. It might require more work at the start as you lay out a patch management policy, but then you can simply carry out regular scans to check for any vulnerabilities and new patches. Done right, you can push updates out to multiple devices at once, saving any need to go to individual devices.

If you want to be more thorough – which we always recommend for something as important as cybersecurity – you need to check the updates in a testing environment before pushing out. This ensures it won’t negatively affect you in any way. And when it’s all done, a final report detailing the process would help for any auditing in the future.

What’s important is you understand why you’re doing it. Make sure all the management and staff understand how it’s of benefit – potentially include it in any cybersecurity training you put your team through. Patch management can be a big undertaking for a team that’s already stretched thin, but there are companies and software available that can handle this vital task for you.

We offer a patch management service so you can be safe in the knowledge that your devices are as safe and secure as possible. This way, your IT team can focus on doing what they do best, and you don’t have to worry about vulnerabilities in your software. Protect your business today with Nisyst Cyber Security. For more information, get in touch on 01204 706000.