Following on from our previous article, this is a brief Scenario concerning using “NAS” storage for backup.
Blog
Backup to Move Forward- Scenario 2
Following on from our previous article, this is a brief Scenario concerning using “Cloud” storage for backup.
Scenario 2: Cloud Drive
5 Things You Can Do Today to increase your Security!
I write a blog almost every week on a different aspect of Cyber Security and threats to our data and digital lives. I wanted to write this article aimed more at the personal user with 5 things which you can implement today (for hardware you may need a couple of days for delivery) to improve your security. Please remember that there is No Silver Bullet for Cyber Security and that this is all about mitigating the risk and reducing the impact of Cyber Attacks.
Backup to Move Forward- Scenario 1
Backup to Move Forward- Scenario 1
A Year in Review for Technology
Cyber Security
So what has happened in Cyber Security?
It’s a lot easier for hobby hackers to be able to compromise machines and data to extort money from the owners and end users. With forums, marketplaces and repositories devoted to “how to’s” and resources for malicious individuals on the dark web, hobby hackers are able to deploy increasingly more complicated and devastating attacks without having advanced knowledge of what they’re doing or even how they’re achieving it.
I’ve been posting a lot about Cyber Security and the fact that Cyber Security is now everyone’s priority, not just businesses and IT managers. The only way in which we can reduce the impact of this is by realising that the weakest link in any Cyber Security policy is the end user.
Internet of Things
Imagine being able to check on your fridge’s stock levels from work before you stop by the supermarket on your way home or place an order online for delivery. Imagine setting the temperature for your house so that it’s just right for your return. Want to get the kettle boiled for your morning coffee without having to leave the warm confines of your bed? No Problem.
The first generation of IoT products which we have access to just now is the first step towards a “Jetsons” future or for the pessimists out there a “Cyberdyne” future. I am really excited to see how this progresses.
3D Printing
3D Printing on an industrial scale is fairly commonplace for the production of consumer goods, but with consumers and end-users now able to “build” spare parts and products in their own home with nothing more than a lump of plastic and a schematic replicators are looking more realistic day by day.
Computer Merging
Dedicated computers for specific tasks started dying out a few years ago now, but now we’re seeing laptops being hit by tablets and mobiles being able to complete the same tasks and be docked in the same way whilst still being more mobile. It’s an exciting time to look for devices as you don’t have to carry around several things anymore as most business can be done from a tablet with a keyboard which you can scribble notes on, draw up proposals, email and present from.
We’re seeing more clients not wanting to be bound to one system or setup anymore and looking at the options available to them for a “merged” device.
As A Service
As A Service takes leasing and loaned equipment further than we’ve ever known it, but providing Hardware, Software, Infrastructure and various other products and services on a monthly basis allowing regular upgrades without the end user having to worry about ownership and upkeep.
If you’d like to know more about As A Service, what it is and how it could affect you and your business please have a look at my previous article.
Summary
If you’d like more information on these or any other technology topic, then please get in touch!
Subcategories
Three random words - How to choose better passwords
When it comes to passwords and internet security, sometimes the simpler solutions are actually the best.
Let’s take a closer look at how to truly safeguard the information you value most.
Choosing your password
We are often told how essential it is to create numerous complex passwords, and that they should be used uniquely across all our internet applications. The logic behind this decision may seem flawed, but it is rooted in real fears.
However, in practice, having too many passwords can be a terrible headache – not to mention a potential security risk. What if you forget your vital passwords? What if you write them down and misplace the note? What if someone else finds your passwords and accesses your accounts?
Memorising your password
Advice for many years has been to simply memorise your passwords instead of storing them. People have been told that storing passwords in any form is inherently a high-risk activity.
While we encourage the use of password managers (alongside recommendations from the National Cybersecurity Centre (NCSC), interest in this tech has remained low. Yet the recommends a refreshed approach to passwords. Would it work for you?
Three random words
NCSC suggests that established thinking around password creation is flawed, because it expects the end-user (us) to memorise numerous lengthy passwords.
Instead of taking this approach, it may make more sense to instead opt for three ‘random’ words – strong enough to work on many different platforms, and to not be guessed by aspiring hackers – but not so obscure that you can’t remember them, either!
The strategy is informed by real-world customer behaviour, making it a little more grounded and practical in scope.
Key areas to consider with this approach include:
- Length of passwords – this will likely be much longer than single-word passwords.
- Impact of passwords – the technique needs to be implemented across multiple different platforms to work most efficiently.
- Novelty of passwords – using three random words can help remove easy guesswork for hackers, making passwords safer and more secure.
- Usability and user-friendliness – this is a crucial aspect to remember, as it allows for user-error and forgetfulness to be overcome without hindering security protection.
Concerns around three random words
Of course, no password solution is entirely failsafe. There is always the possibility this approach could be seen as weaker than completely randomised password approaches, though the NCSC argues this is not entirely true.
Instead, the randomisation and length of the passwords could in fact be considerably stronger and more targeted than some passwords that are traditionally considered as efficient, but are actually incredibly easy to guess and exploit.
To find out more about the topic, head for the official National Cyber Security Centre website. Get practical help with your cybersecurity by contacting our expert team.