Skip to content

Our Opinion

Image of a person and email

Based on numerous conversations we have had with businesses as they work through their GDPR compliance, there appears to be some confusion with GDPR and email.  Particularly whether they can continue to communicate with their clients or whether they now have to get explicit consent to do so. These communications may take the form of emails or text messages or newsletters. Hopefully this will help... ...continue reading "GDPR: Do you need to email everyone to get permission to contact them?"

With GDPR password security is more and more important as it is one of the most elementary parts of computer security. Yet lots of customers tell me that remembering passwords is a real problem. Ideally every password should be a totally random mixture of characters, but for many this is too challenging. So here are some tips on GDPR and passwords and how to create passwords that are not ideal but may be acceptable.

Image of a person entering a computer password

...continue reading "GDPR and Passwords"

Part of GDPR (General Data Protection Regulation - more here https://technologytamed.com/gdpr/) is assessing the way you store patient data. Many businesses use to removable USB drives which are then taken offsite. When assessing your GDPR risks you may decide that you would like to also encrypt portable drives you use that may contain personal data.

The following gives you step by step instructions on how to use one of the most popular encryption methods: VeraCrypt (which is derived from TrueCrypt). ...continue reading "Encrypting USB devices with VeraCrypt"

With GDPR encrypting USB drives with BitLocker is an easy way to help to secure personal data.

Part of GDPR (General Data Protection Regulation - more here https://technologytamed.com/gdpr/) is assessing the way you store customer data. Some businesses backup to removable USB drives which are then taken offsite. Or use removable USB drives to transport data. If personal data is stored in this way a GDPR recommendation is that the device is encrypted.  If you have Windows 10 Professional or Ultimate encrypting USB drives with BitLocker is relatively easy. ...continue reading "Encrypting USB Drives with BitLocker"

Spectre and Meltdown security Flaws in Most Modern Devices

I am sure many of you will have heard that there are security flaws in Intel, AMD and ARM processors - called Spectre and Meltdown. Spectre affects all modern processors, whereas Meltdown affects Intel, plus Itanium and Atom chips made before 2013. Potentially these flaws could enable hackers to steal passwords and sensitive data from ANY device made in the last 20 years that has a processor. Note this includes Apple devices - see link at bottom of page for which versions have been issued 'mitigations' (in Apple speak).

...continue reading "Update About Spectre and Meltdown Security Flaws"

Image of person breaking into a computer

Over the last 10 months I have constantly mentioned security, security, security, because we live in a world where criminals are exploiting every IT and online weakness they can. In 2015 we had very few businesses phone us with problems.  In 2016/17 we have seen an increase – as criminals are now targetting businesses. So much so, that I think you need to dedicate November to looking at your security. ...continue reading "November Housekeeping = Internet and IT Security"

We have often visited new clients and found that they don't understand the difference between differential and incremental backups. Nor the consequences. Sometimes with the result that they have lost vital data. So here is a quick summary. ...continue reading "September Quick Tip: Incremental versus Differential Backups"

 

Image of a person removing files from a computer

Backups are the computer task that everyone hates until there is a disaster, and then they are so pleased that they have good backups. The challenge is that backing up is not very exciting. So they are easily forgotten or neglected. You may not be excited with September's housekeeping, but it really is good to check your backups. So September housekeeping = backups ...continue reading "September Housekeeping = Backups"

Image of a person doing email housekeeping

Email is now the most important part of most businesses IT. Take away someones access to files and folders and they may moan a little. Take away access to their emails and they will be seriously unhappy. Communication is vital to modern businesses and email is now the most popular form of communication for most small businesses. Yet it is often given less housekeeping attention than the company printer. So August is the month to change this - the month to do some email housekeeping. ...continue reading "August Housekeeping = Email Housekeeping"

Image of a person painting the letters www

Most businesses have a website now, but small businesses often don’t have the ability to manage the website themselves. So they often rely on third parties. These third parties may be brilliant or they may be dire.  Either way there are some key questions you should be asking yourself, and your suppliers regularly. So this month we are doing website housekeeping: ...continue reading "June Housekeeping = Website Housekeeping"

google-site-verification: googlec34c8230c302d592.html