Fake Windows 11 installers could install malware on your computer… how?

post image

Many people have been very eager to install Windows 11 before its release was even announced. This has resulted in the system being leaked before it was officially released. Situations like this are like Christmas to hackers and interlopers, as it allows them to attack systems with a fake operating system and malware-riddled installers. ARead more

Migrating staff back to the office – is everything working?

post image

With the recent announcement of the start of relaxation of lockdown rules, a lot of businesses will be considering bringing employees back into the office. After a year of mostly working from home or on furlough, systems that remained at the office may need extensive updates and synchronisation. You would be surprised how many small and big updates can accumulate if PC’s and laptopsRead more

Fraud or cybercrime? Protecting yourself and your Data.

post image

Fraud is when trickery is used to gain a dishonest advantage, which is often financial, over another person. Cybercrime is any criminal act dealing with computers and networks.  Both individuals and businesses become victims of fraud every day. Other words used to describe fraud could be scam, con, cheat and confidence trick. The cost of fraud isRead more

Avoiding Ransomware as part of IT Security.

post image

Ransomware is a type of malware (malicious software) which criminals use to extort money. It holds data to ransom using encryption or by locking users out of their device. A lot of the ransomware attacks that have happened in the past have been linked to poor protection practices by employees or by insecure networks.  Here are a few dos and don’tsRead more

Encryption as part of IT Security

post image

What is encryption? Encryption is the method of converting information into secret code that hides the information’s true meaning. The science of encrypting and decrypting information is called cryptography. Unencrypted data is known as plaintext, and encrypted data is called ciphertext. The formulas used to encode and decode messages are called encryption algorithms, or cyphers. WeRead more

Software to protect your business.

post image

There are many different software packages available on the market to protect your company’s systems, servers and other devices from viruses, hackers and malware. To make sure you’re protected from all types of attacks, we’ve prepared a short article on some of the different packages available to protect your company and what they’ll protect you from!    Antivirus software helps protect your whole system against maliciousRead more

How to prevent and remove viruses and malware?

post image

What is a computer virus? A computer virus is a piece of code, which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros to execute its code. InRead more

Virus protection

post image

It is imperative that all company devices are protected by up to date Anti Virus software.  This should not only protect individual devices from running malicious software but should monitor emails, web access and removable devices for both malicious and unwanted content. ACS Technologies partner with ESET to offer a wide range of Anti VirusRead more

Encryption & Data Security

post image

Businesses often underestimate the value of the data they hold.  many companies may feel that their data is not particularly sensitive and that no one would want it anyway, however, every business has a legal right to protect the data they hold on clients, prospects, suppliers and personnel as well as protecting their own interests.Read more

Cyber Attacks Soar to 26 million a day

post image

These were the initial words of a recent national newspaper headline and it went on to say that ‘as hackers find new ways to wreak havoc’. This newspaper article was based on an annual report by specialist Sonicwall which can be downloaded at https://www.sonicwall.com/resources/white-papers/2018-sonicwall-cyber-threat-report-2/. In October 2018, the UK government said “98% of UK businesses nowRead more