Posts

Why you should be using a Password Manager

Do you use the same, easy to remember password or a variation of it for every account login you have?  You are certainly not alone!  We are constantly being told to use strong, unique passwords to protect our information online but how on earth are we supposed to come up with complicated passwords and remember them with the volume of login details we have!  It is a challenge!

The answer is a Password Manager.

A Password Manager will store your passwords in an encrypted form and also help you with generating secure random passwords.  The password manager will have a password to allow you to access it so you will only need to remember one password.   You will then easily be able to access your passwords without having to remember them.

The risks of using the same password across many sites are enormous.  Passwords are stolen all the time.  If you have a weak password and use it multiple times and a hacker got hold of it, that means that they could log into other sites with that password.  With cybercrime continuing to be on the increase, hackers are constantly looking at new ways and fine-tuning their techniques to crack users’ passwords.

One thing to be careful of is using browser-based password managers – Chrome, Firefox and Internet Explorer etc, all have integrated password managers.  Chrome and Internet Explorer store the passwords on your computer in an unencrypted form.  These built-in password managers are not ideal and cannot compete with a dedicated password manager product.

There are a number of password managers available on the market:

Myki:  can be used by teams and single users but has also been developed for the MSP market.  Myki securely stores and manages internal and customers’ passwords offline, away from the cloud.

Keeper:  can be used to protect your business as well as your personal passwords and private information.

Dashlane: is a safe and easy way to manage business and personal passwords.  It enables you to keep all of your passwords, usernames, payment card details, and secure notes in one safe place.  Dashlane is also packed with other features, making it more than just a password manager.

LastPass:  is a cloud-based password manager with a browser extension and mobile app for all the browsers and operating systems available.

Once you have chosen a password manager to use, it is good practice to change all your passwords to more secure ones.   If you would like to learn more about any of these products or would like help with choosing the most suitable one for your business, Ilkley IT can help you.   Contact us today to find out more.

Just how important is Email Security?

Cyberattacks are rapidly increasing every day with hackers becoming more and more sophisticated and the scams more elaborate than ever before.  It is reported that in 2019, around a third of businesses in the UK identified at least one breach or attack each month. The most common types are phishing attacks comprising 80% along with impersonating emails, viruses, spyware or malware including ransomware.

Let’s look at the jargon being used surrounding these attacks so we can really understand this threat.  Malware is a word used to describe any type of malicious software which usually piggybacks on an email or document containing links, Ransomware is typically spread through phishing emails and Phishing is the use of technology to lure victims into providing sensitive and personal information.

5 ways to identify a phishing email:

  1. If the email asks you to confirm personal information, such as banking details or login credentials, information that you would not usually provide.
  2. The web and email addresses do not look genuine – at a quick glance these might look correct but on closer inspection, they will be slightly varied but intended to look genuine. Hover over any links in the body of the email as these might be malicious.
  3. It is poorly written – if the email is full of spelling and grammatical errors, there is a strong possibility it is a phishing email. Legitimate emails from companies will be written professionally and checked for spelling and grammatical errors.
  4. There is a suspicious attachment – it is always good practice to scan attachments using antivirus software particularly if you receive an email out of the blue with an attachment that you weren’t expecting.
  5. The email is designed to make you panic – it is common that phishing emails will incite panic in the recipient as it will ask for immediate action to be taken on personal items such as bank accounts.

Office 365 has a solution to help protect your emails, files and online storage.  Office 365 Advanced Threat Protection (ATP) protects your mailboxes, files, online storage, and applications against new, sophisticated attacks. It offers protection for all the major Microsoft apps such as Microsoft Teams, Word, Excel, PowerPoint, Visio, SharePoint Online, and OneDrive for Business.

Office 365 Advanced Threat Protection (ATP) offers the following benefits:

  1. Safe Attachments: ATP protects you against unsafe attachments and provides you with a malware-free, cleaner inbox.
  2. Safe Links: ATP blocks users from clicking on malicious links.  If a link they click on is unsafe, the user will either be informed that the site’s been blocked or warned not to visit it.
  3. Spoof Intelligence: This detects when a sender appears to be sending an email on behalf of one or more user accounts within one of your organisation’s domains.  It enables you to review all senders who are spoofing your domain, and then choose to allow the sender to continue or block the sender.
  4. Quarantine: Messages identified by the Office 365 service as spam, phishing mail or potentially containing malware can be sent to quarantine.

The impact of a cyberattack is not only time consuming but costly. One accidental or careless click by an employee has the potential to compromise your entire network.  Office 365 Advance Threat Protection offers industry-leading, comprehensive protection, can your business really afford to be without it?

No one is safe from these attacks, all businesses are a potential target and need to remain vigilant, don’t wait until you have been the victim of a cybercrime to take action.    Ilkley IT Services can help you to get the protection you need so that you can have peace of mind and get on with running your business.  Contact us today to find out more.