Skip to content
Facebook page opens in new windowTwitter page opens in new windowLinkedin page opens in new window
  • CLIENT HELPDESK
services
Search:
SEARCH
Intalect
IntalectIntalect

CALL SALES & SUPPORT ON
01455 560048

  • Home
  • Managed IT Support
    • Business IT Support
    • Schools ICT Support
    • Cloud / Office 365 / Azure
  • Solutions
    • Disaster Recovery
    • Cyber Security
    • Cyber Essentials
    • Office 365 / Azure / Cloud
    • System Assessment
    • VoIP
    • Leasing
    • Low Cost Leased Lines Leicester
  • News & Tools
    • Risk Assessment
    • News & Blog
    • Knowledge Library
      • Free Training Videos – Microsoft 365 Teams
    • Password / Mobile Phone Breach Tool
    • Password Checker
  • About
    • Our Team
    • Contact
    • Terms and Conditions
  • Home
  • Managed IT Support
    • Business IT Support
    • Schools ICT Support
    • Cloud / Office 365 / Azure
  • Solutions
    • Disaster Recovery
    • Cyber Security
    • Cyber Essentials
    • Office 365 / Azure / Cloud
    • System Assessment
    • VoIP
    • Leasing
    • Low Cost Leased Lines Leicester
  • News & Tools
    • Risk Assessment
    • News & Blog
    • Knowledge Library
      • Free Training Videos – Microsoft 365 Teams
    • Password / Mobile Phone Breach Tool
    • Password Checker
  • About
    • Our Team
    • Contact
    • Terms and Conditions

Tag Archives: ransom

You are here:
  1. Home
  2. Entries tagged with "ransom"

Windows 7 is End of Support Life on January 14th 2020

Business, Cyber Security, Education, TechnologyBy Richard HamiltonNovember 1, 2019Leave a comment

As you already may or may not know, and if you have seen our earlier posts on this subject.  Microsoft Windows 7 Operating System goes end of Microsoft life on 14th January 2020. Along with some other key operating systems such as Server 2008 and 2008 R2. Which lots of companies run as they use…

passwords check blog post- image of white padlocks locked to a red fence

3 in 4 staff would fail a simple password check

Business, Cyber Security, Education, TechnologyBy Jade HolmesMay 23, 2019Leave a comment

One of the most common ways hackers find their way into businesses is by brute force cracking passwords. This is where they try millions of variations of simple words, characters and numbers.  Even if you think your passwords are secure and unguessable, what about your staff? Are you sure there’s no-one using Password1234 to access…

Are you backing up your Office 365? Here’s why it’s essential

Business, Disaster Recovery, Education, TechnologyBy Jade HolmesApril 24, 2019Leave a comment

Office 365 has become a valuable and powerful tool for many businesses, but do you know exactly where your data is stored? And what if something happens and your data is lost, Microsoft has backups right? Wrong. Unfortunately, many people are under the misconception that Microsoft has backups of all your business data, when in…

beat the baddies post image- picture of person playing chess

65,000 hacks a day… how to beat the baddies!

Business, Cyber Security, TechnologyBy Jade HolmesApril 12, 2019Leave a comment

Cyber crime continues to be the number one threat affecting UK businesses. With a staggering 65,000 hacking attempts made every single day, which means that a business in the UK is targeted by cybercrime every 19 seconds. Shocking. Your business is at risk right now. Hackers are targeting all businesses in Leicestershire, all day every…

Image of stream of lights with padlock on fence

Which member of your staff is using the password “Fluffy1234”?

Business, Cyber Security, Education, TechnologyBy Jade HolmesMarch 25, 2019Leave a comment

Did you know that cyber crime is now the number one threat to UK businesses? It costs the economy £27 billion a year. Ouch. So we all need to take a no-nonsense approach to online security. A password alone is no longer enough to keep your business-critical data safe. Because most of the time, it’s…

11 months till your software expires?

Business, Cyber Security, Education, TechnologyBy Jade HolmesJanuary 17, 2019Leave a comment

You might not already know this, but in January next year (2020) some of the most popular Microsoft business software will reach the end of its life. Dead. Gone. Kaput. It’s called the 2020 problem, and it’s going to affect half of all businesses in the UK. Because when that happens, Microsoft will no longer…

Online Shopping: dream bargains or nightmare before Christmas?

Business, Cyber Security, Education, TechnologyBy Jade HolmesDecember 5, 2018Leave a comment

Christmas, it’s a time for loved ones, good food, warm fires, presents and merriment. It’s undoubtedly one of the busiest times of the year, what with the flurry of activity both online and offline throughout the festive period. Online shopping is a brilliant way to get all your gifts ordered and delivered with just a click…

Hacking. Our advice as discussed on BBC Radio Leicester

Business, Cyber Security, Education, TechnologyBy Jade HolmesNovember 25, 2018Leave a comment

Our Operations Director Andy Viner had the pleasure of being invited onto the mid-morning show on BBC Radio Leicester on the 14th November. He discussed the dangers of hacking and how to keep you and your business safe. If you missed it don’t worry you can listen to his interview below: When you think of…

GDPR blog post- image of an ostrich head

GDPR six months on: The urgency to take action has gone… but the law hasn’t…

Business, Cyber Security, Education, TechnologyBy Jade HolmesNovember 8, 2018Leave a comment

Back in May, we all heard a LOT about the new GDPR regulations coming into force. And since then a lot of business owners and managers have adopted the ostrich principle… you know, stick your head in the sand and hope it all goes away! That’s normal. It’s driven by a genuine lack of understanding…

Phishing post- image of person holding a fishing rod

Would you take the bait? It’ll cost you £1.22million…

Business, Cyber Security, Education, TechnologyBy Jade HolmesOctober 19, 2018Leave a comment

You’ve probably heard of phishing attacks. But do you know what phishing actually means? At its simplest, it’s a hacker sending you an email, pretending to be someone else. Perhaps a supplier sending an invoice. Or an email from a customer. And someone in your business clicks on the link, genuinely not meaning to do…

12
Intalect
© Intalect - 2019. All rights reserved. Website built by Brio Media
  • Home
  • Managed IT Support
    • Business IT Support
    • Schools ICT Support
    • Cloud / Office 365 / Azure
  • Solutions
    • Disaster Recovery
    • Cyber Security
    • Cyber Essentials
    • Office 365 / Azure / Cloud
    • System Assessment
    • VoIP
    • Leasing
    • Low Cost Leased Lines Leicester
  • News & Tools
    • Risk Assessment
    • News & Blog
    • Knowledge Library
      • Free Training Videos – Microsoft 365 Teams
    • Password / Mobile Phone Breach Tool
    • Password Checker
  • About
    • Our Team
    • Contact
    • Terms and Conditions
Navigation
Go to Top
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. AcceptReject Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT