Infographic: The pitfalls of failing to update computer systems

Outdated computer systems are vulnerable to a variety of attacks online. The problem is that hackers continuously look for new vulnerabilities to exploit, so once support is ended for a system (in other words, once a system is no longer being updated to counter new security threats), it’s usually only a matter of time until an attack gets through. This is particularly problematic in the charity sector, where organisations might hold sensitive information and often don’t have the budget to upgrade their IT equipment. It’s because of this that we’re happy to offer the latest Windows operating systems and also award-winning antivirus software to UK charities on the…
Read More

How to deal with leavers in Office 365

When someone leaves your organisation, it’s important to make sure that you secure any confidential files and data. Thankfully, if you use Office 365, you have a good level of control to manage this process. There are a variety of options available to you, allowing you to completely remove access from mobile devices, delete accounts, or move accounts to replacement employees. To find out how to do all of this, scroll through the resources below or click the links to visit specific sections. Note: All of the below assumes that your Office 365 account has ‘global administrator’ permission. I will be…
Read More

Guarding your charity’s data: a word about firewalls

Most people nowadays will have heard of a firewall, and the majority of those will know that it has something to do with data security. But if asked what it is that a firewall actually does or how it differs from an antivirus, people are generally a lot less sure. This is understandable – as opposed to antivirus software, where the clue is in the name, a firewall is a more ambiguous term. To help you understand exactly what your firewall does and why you need one, I’ll run you through some of the basics about firewalls and advise you…
Read More

Mastering the art of the password

Since the Heartbleed data breach, there have been an army of security and IT professionals telling us to change our passwords and usernames for all of our online accounts. The reason for this is simple – when one website’s security is compromised, it is surprisingly easy to access other accounts from different websites. This is mainly down to a lack of variation in our passwords and usernames. Most of us are guilty of using the same password and username combinations for numerous accounts because it’s easier; using different security information for each account just makes it harder to remember which…
Read More

IT Security for charities: a problem in the spotlight | Bitdefender

Most charities operate with a sense of optimism and faith in humankind that allows them to do incredible work in their fields. They strive tirelessly to raise funds for their cause and advocate change with passion. Despite this important work, humanitarian vision and financing of charities, they are often left vulnerable to attacks from a cyber-underworld that has no compunction about stealing pension money from little old ladies or taking food from the mouths of babes. As an online threat researcher, I have witnessed too many attacks on charity websites that could severely set back their goals and tarnish the…
Read More

‘Help! My computer is playing up!’

We’ve all been there – you’re working on an important document or grant application and suddenly your computer freezes, forcing you to shut down and enter a state of panic while you find out if you have lost all your hard work. While it’s impossible for me to cover all the causes of system failures and how to prevent them in a single blog, I thought I’d share some general thoughts on how you can minimise the risk of IT outages and a few trouble-shooting tips you can apply to keep the IT support team at bay! Restart, restart, restart….
Read More