Cybersecurity
Beware that corrupted email attachment: It could be a scam
You’re scanning your inbox and spot an important email with a Word document attached. Maybe it’s an invoice, a message from a supplier, or even a request from a colleague. You open it without thinking twice… and just…
Are your employees your security’s weakest link?
Let me ask you something: Do you lock your front door when you leave the house? Of course you do. But what if you get home and find that someone left a window open? You may as well…
Reply-Chain Phishing Attacks
In today’s digital age, email remains a crucial communication tool for businesses. However, this widespread reliance makes it a prime target for cybercriminals. Among the various phishing tactics, reply-chain phishing attacks have emerged as particularly deceptive. Understanding and…
No Problem IT is ISO 27001 certified!
As of December 2023, NPIT is ISO 27001 certified. This certification demonstrates that our services meet the highest possible standards for data security, minimising the risk of data breaches or cyber security incidents. At NPIT, we are dedicated…
The Perils of Computer Viruses: Safeguarding PCs and Macs
In an increasingly digitised world, where computers have become an integral part of our lives, the menace of computer viruses looms large. These malicious programs can wreak havoc on both PCs and Macs, compromising sensitive information, disrupting operations,…
Received an email from a trusted source? You should still be careful clicking on any email link or URL.
Phishing emails can appear genuine but may contain dangerous email links or URLs. We recently had a case where the personal account of one of our clients got hacked… which in turn caused one of their clients to…
How to keep your company safe from attacks.
What can you and your (MSP) Managed Service Provider do to keep your company safe from attacks? You and your MSP need to protect your data more than ever. Here is what you can do to protect your…
LastPass Password Managers: Is it time your business started using them?
According to Watchguard, 91% of all passwords found in data breaches are weak or reused. In addition, 50% of hackers can gain access to systems with weak credentials within 2 minutes. This post looks at what a security…
Selecting Your IT Provider: 6 Things to Look For
For businesses of any size, especially small and medium-sized businesses, choosing an IT provider is a critical decision. There is a myriad of IT support companies out there but finding the right one for your business can be…
7 simple tricks to avoid Spam and Phishing emails
Spam and phishing emails are getting harder and harder to detect as fraudsters use ever more sophisticated techniques to avoid automatic detection and deletion. While many email platforms have software to filter out scam emails, these sophisticated phishing…