Zero-day is what the cyber security industry refers to as the time between a vulnerability being discovered and the software's developers discovering it for themselves. What is Zero-day? ...
“We confirm that in 2020 and 2021 we observed and notified the government of the United Kingdom of multiple suspected instances of Pegasus spyware infections within official UK networks.” The...
"These are questions that you need to have an answer to so that you aren’t struggling to resolve the problem due to lack of preparation." Worldwide, three out of four organisations have...
"Hello, I'm calling from Microsoft Windows tech support." Social Engineering Fraudsters are adopting increasingly sophisticated techniques to manipulate users into divulging private...
An often overlooked part of a computer setup in a business environment is the monitor. To most people, as long as a monitor displays the image, it's good enough for...
Increased mobility allows businesses to be more productive and efficient, regardless of their location. Do you use Gmail? Or perhaps Spotify? A Kindle? Dropbox? These are all cloud services that...
A Disaster Recovery and Business Continuity plan is to ensure that business functions can continue in the event of an outage. Floods, hurricanes, power outages, hacking, sabotage... if you're lucky,...
Phishing attacks spread quickly and they're getting more sophisticated and believable. Data security is the protection of your data from unwanted access and corruption, it ensures the safety of your...
You may have heard of VPN’s and you possibly even know that it stands for 'Virtual Private Network', but did you know that there are several types of VPN and...
If users in your company are using Outlook on phones running an older version of Android, they will no longer be able to update to newer versions of Outlook. Background...
Rules & Alerts are very powerful for productivity and a brilliant way of clearing the clutter from your inbox. If you use email on a daily basis, then there’s a...
There’s no way to guarantee that you won’t suffer an attack, but there are ways to minimise the chances. Ransomware definitionRansomware is malware (malicious software) deigned to exploit a user...
"The sender often knows details about you or your business." What is spear phishing? Typical bulk email phishing attempts are being replaced by more targeted techniques. Although they require more...
Here's all you need to know about Windows 11 and the minimum requirements to run it Will my computer run Windows 11? The easiest way to check if your computer...
Cyber security is always important, no matter the size of your business. Starting an independent business can be overwhelming, the number of things to sort out often feels endless. One...
As your business grows, your IT support must grow with it in order to support your businesses future and maintain security. Itek Systems Management have compiled a list of signs...
Creating a strong password may seem like a daunting task, especially when it is recommended that you have a unique password for each site you visit that contains a combination...
As the coronavirus continues to spread throughout the globe, more countries are going into lockdown and awaiting for a vaccine to combat the deadly disease. Until then, doctors are still...
As more and more people are being forced to spend time confined in their homes due to the UK lockdown, there is an increase of employees working from home and...
Windows 7 support has ended. What this means is that if you're still using it, you should probably stop using it. There will be no further bug fixes, feature updates or...