ONE WAY OR ANOTHER, JULY 2021 YOUR ARE GOING TO TAKE YOUR BUSINESS DOWN

get ahead. And with the estimated cost The threat of an insider attack in per insider attack being hundreds of Presents your business is more real than thousands of £££, can you afford not to create a plan to protect your data? you realise. QUESTION I know I just saved a Of course, it’s not always intentional. We call it an insider threat strategy, and Most insider attacks happen because it covers everything from training to staff document, but I can’t find of naivety or negligence. Perhaps you exit planning. where it went haven’t educated your people on cyber security and the red flags to be aware For a short time, we’re offering to create an insider threat ANSWER of. Possibly someone had a momentary This is more common than you lapse in judgement. It happens, a lot. strategy for local businesses. think. You click ‘save’ and when you Our experts will assess your But almost a quarter of insider attacks business, its current security try and reopen your file, it’s not in are malicious. measures, and make the folder you thought you’d saved recommendations to keep it to. Don’t worry, simply open up your data safe. Your monthly newsletter, That’s someone on the inside actively a folder, click on ‘recents’ and your stealing your data, or allowing others document should be there. Look written for humans not geeks access to it. This may be someone with at the file information and it will a grudge, someone looking for financial Let’s ditch the show you where you’ve saved it. gain, or even someone who has already Visit left the business. www.your-itdepartment. passwords DID YOU So what plan do you have in place to co.uk/insider-threat QUESTION KNOW? tackle and reduce your risk of an insider to book a no obligation attack? Because as with everything in I clicked a link in a phishing business, planning is the best way to 15 minute video call. email. What do I do? Did you know… you don’t need a third party ANSWER Don’t panic, we haven’t gone completely crazy. We’re still app to screen share? First, do not enter any data. the security-conscious company you know and love. If you found yourself teaching older Let’s talk on a video call Disconnect your device from the members of your family how to use . If you’ve got malware, But passwords are a pain: Zoom last year, you’ll understand • First it was “remember to change your password frequently” this will stop it from spreading. the frustration of trying to explain Here are three questions for you: • Then it was “use randomly generated passwords” something without being able to Run a full malware scan. And then 1. Do you currently have an IT support company? • And then “don’t forget to use a password manager” see what the other person can see. consult an IT expert. They’ll advise 2. On a scale of 1 to 10, how happy are you with them? In these cases, screen sharing can 3. If the answer isn’t “I’m so delighted I could print 1,000 flyers to spread the word about how safe your backups are, and Things change so often it’s hard to keep up. However, we’re lucky that we’re being given new, more secure ways to keep our people and data protected. be very helpful. them”, let’s jump on a video call whether you need to change any However, downloading a third The pandemic taught businesses just how important it is to get proactive, responsive IT passwords. And with biometrics becoming more widely used, it’s time you make some more party app to do this isn’t always support. That’s what we do. And we’re now taking on new clients again. changes to the way you log into your devices. Sorry. straightforward. And it relies on the other person being able to do the What are biometrics? You may already be using them – it’s when you use facial or same. fingerprint recognition to unlock your device. Retinal scanning is even a thing (although Set up a 15 minute video call at QUESTION not yet widespread for everyday devices). And they give you an added layer of security, Here’s the answer. Did you know My apps keep crashing, because someone can’t steal your fingerprint or your face! you can use Quick Assist on www.your-itdepartment.co.uk/lets-chat what’s wrong? Windows PC? You can also use biometrics across your apps and software to give you more Just type ‘quick assist’ in the protection from cyber criminals. It means that should someone steal your device, or ANSWER . You’ll be given two access it remotely, they can’t access your accounts and data. What better way is there options: ‘Give assistance’ and In true IT support style: have you to protect your accounts? ‘Get assistance’. Select the one tried turning your device off and you need and simply follow the If you haven’t got biometrics set up within your business, give it a try. We can on again? If it’s still happening, try instructions on screen. guarantee that this technology is only going to increase in popularity thanks deleting the app and reinstalling to the added protection it gives you. A word of warning: only allow this it. If it’s still happening, you may be kind of access to your device to someone you know and trust. This is how you can get in touch with us: low on storage space. CALL: 0115 8220 200 | EMAIL [email protected] WEBSITE: www.your-itdepartment.co.uk www.your-itdepartment.co.uk www.linkedin.com/company/ www.facebook.com/youritdeptltd your-it-department-ltd Craig Pearson

Sales and Marketing INSPIRATIONAL QUOTE OF THE MONTH Techn logy update Director “Science and technology revolutionise our lives, but memory, tradition and myth frame our response.” Arthur Schlesinger, historian

This month we’ve been thinking a lot about privacy, especially when Tech Fact#2 it comes to people’s online habits. Tech Fact#1 The name Yahoo was created Though the vast majority of us Registering a domain name by Jonathan Swift for his book would have nothing to hide if Gulliver’s Travels in 1726)… someone was monitoring what was free until 1995. Then we do online, we still want our which explained a “yahoo” to privacy to be respected. the first fee was huge - be a really ugly person Have you ever become £70 for two years concerned at how well targeted online ads are? Or seen adverts relating to something you’ve not typed Tech Fact#3 into a computer… but clearly your device has heard you Almost half the world’s talking about it? population has never made a Recently, a number of steps As always, we’d love to have been taken to reduce hear your thoughts on this phone call tracking without your specific one. Start a conversation permission, especially in the latest iPhone iOS. on our social media or drop us an email. But is it enough? What else do you think needs to be done to protect our privacy online? 365 TIP Do you find behaviour tracking helpful as you see more FUN TECH QUIZ You know when you copy and paste, and you targeted content? Would you It’s quiz time again! rather see more targeted accidentally copy something new… losing adverts online, or do you find it Who’s the genius in your office who can get 5 out of 5 on this one? information you hadn’t yet pasted. It’s annoying. too creepy? 1. What year did Google acquire YouTube? Instead of getting frustrated, use this neat little 2. What type of port does an iPhone 12 have? trick on your Windows PC: Clipboard history. And what about the other side What does the acronym ‘HTML’ stand for? of the coin? As a business 3. Go to Start > > System 4. What does ‘haptic’ mean? owner, what’s your opinion Click ‘Clipboard’ and toggle ‘Clipboard history’ to ON

about how you can target a 5. What year was the first SMS message sent?

4) To touch. Phones use haptic feedback to help make them more useful | 5) 1992. It was “Merry Christmas” “Merry was It 1992. 5) | useful more them make help to feedback haptic use Phones touch. To 4) specific audience online? The answers are below. Language Markup Hypertext 3) | Lightning 2) | 2006 1) Once you’ve done that, type Windows + V and you can see a list of the last 25 things you copied. Simply click on the one you need to re-copy it.