Call us on 01706 239000 |  Support Helpdesk

Nine Best Security Practices to Apply Now

Our partner Sophos have put together a list of the nine best security practices to apply now. Patch early, patch often Malware that doesn’t come in via a document often relies on security bugs in popular applications, including Microsoft Office, your browser, Flash and more. The sooner you patch, the fewer holes there are to […]
Read More →

How Strong is your Password?

  We’ve all had those annoying pop-ups when creating a new password – you must use one special character, one capital letter, six letters, 2 numbers, one emoji…. (maybe not that last one.) Given the possible risks, it’s understandable that companies want you to use complicated and harder to guess passwords. Unfortunately, what many of […]
Read More →

July’s IT Security Briefing from NCS IT Ltd

  Welcome to July’s issue of our IT Security Briefing. This month we have included articles about various ways to enhance your IT security. You can learn about password generators and how helpful they can be to create secure and complex passwords; Find out why backups are crucial to your business; Read about recent data breaches and […]
Read More →

June’s IT Security Briefing from NCS IT Ltd

Welcome to June’s issue of our IT Security Briefing. This month we will be talking about phishing and other methods that criminals use to attack your business. You will also learn about data encryption and two-factor authentication security techniques. We have also included a link to Sophos’ “Threatsaurus” document which is really useful and we […]
Read More →

The Sophos Threatsaurus – A-Z of Security Threats

  Sophos have put together an A-Z of computer and data security threats – it’s a great free useful tool which you can read and download from here >
Read More →

What is Two-Factor Authentication?

  Standard security procedures tend to only require a username and password which have become increasingly easy for criminals to gain access to a user’s data. Two-factor authentication, also known as “multi-factor authentication,” is an extra layer of security that requires not only a password and username but also something only the user has access […]
Read More →

Encryption – what is it and how does it work?

  The need for encryption is at an all-time high with an increasing number of businesses and consumers falling victim to cyber crimes. The recent introduction of GDPR has also highlighted the growing need for businesses to use encryption (and other methods) to keep their data secure. In its most basic form, encryption is the […]
Read More →

May Issue of our New IT Security Briefing

  Welcome to the new IT Security Briefing e-newsletter which replaces our old Byte-Size News. Each month we will send all of our support customers an e-newsletter completely focused on security aspects of your IT system. If there is anything you would like us to cover in future issues, please email me on kirsty@ncs-support.com. This month […]
Read More →

Safe Internet Use

  Here are some top tips for using the internet safely: Check for presence of an address, phone number and/or email contact – often indications that the website is genuine. If in doubt, send an email or call to establish authenticity. Check that the website’s address seems to be genuine by looking for misspellings, extra […]
Read More →

Security Bug Threatens iDevices Running iOS 9 and iOS 9.0.1

September has been a big month for Apple with the announcement of the new iPhone 6S, iPhone 6S Plus, iPad Pro and new operating system iOS 9. Unfortunately it looks like there’s a bug affecting iPhones, iPads and iPods using iOS 9 and iOS 9.0.1. This bug lets hackers gain access to your contacts and […]
Read More →