<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>David Gilbey &#8211; Just Gilbey IT Solutions Ltd</title>
	<atom:link href="https://justgilbey.co.uk/author/david-gilbey/feed/" rel="self" type="application/rss+xml" />
	<link>https://justgilbey.co.uk</link>
	<description>Managed IT Support &#38; Solutions. We innovate. We Support. We Simplify.</description>
	<lastBuildDate>Tue, 17 Jan 2023 15:35:46 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.5</generator>

<image>
	<url>https://justgilbey.co.uk/wp-content/uploads/2021/09/favicon-150x150.png</url>
	<title>David Gilbey &#8211; Just Gilbey IT Solutions Ltd</title>
	<link>https://justgilbey.co.uk</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>7 tips – How to Create an Effective Data Backup Strategy (and Why You Should)</title>
		<link>https://justgilbey.co.uk/blog/business-continuity/7-tips-how-to-create-an-effective-data-backup-strategy-and-why-you-should/</link>
					<comments>https://justgilbey.co.uk/blog/business-continuity/7-tips-how-to-create-an-effective-data-backup-strategy-and-why-you-should/#respond</comments>
		
		<dc:creator><![CDATA[David Gilbey]]></dc:creator>
		<pubDate>Thu, 08 Dec 2022 21:59:30 +0000</pubDate>
				<category><![CDATA[Backups]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[backups]]></category>
		<category><![CDATA[disaster-recovery:disaster recovery]]></category>
		<category><![CDATA[it-strategy:IT strategy]]></category>
		<category><![CDATA[managed-services-provider:managed services provider]]></category>
		<guid isPermaLink="false">https://justgilbey.co.uk/?p=4550</guid>

					<description><![CDATA[Whether you&#8217;re a start-up or global corporation, backups are an essential part of any business&#8217; IT strategy.Making and securing multiple versions of your important data ... <a title="7 tips – How to Create an Effective Data Backup Strategy (and Why You Should)" class="read-more" href="https://justgilbey.co.uk/blog/business-continuity/7-tips-how-to-create-an-effective-data-backup-strategy-and-why-you-should/" aria-label="Read more about 7 tips – How to Create an Effective Data Backup Strategy (and Why You Should)">Read more</a>]]></description>
										<content:encoded><![CDATA[
<p>Whether you&#8217;re a start-up or global corporation, backups are an essential part of any business&#8217; IT strategy.<br>Making and securing multiple versions of your important data is essential for avoiding the data loss due to theft, malicious activities, or even a fire or flood in your workplace.</p>



<p>We understand that making copies of data and organizing them can be difficult for business owners.</p>



<p>Therefore, we&#8217;ve put together some suggestions on how to create an effective data backup strategy and keep up with backups to prevent data loss.<br>If you need convincing why backups are important? &#8211; Check these two articles out:</p>



<p class="has-text-align-center"><a href="https://justgilbey.co.uk/blog/backups/backups-what-are-they/" target="_blank" rel="noreferrer noopener">Backups &#8211; Why Should we care?</a></p>



<p class="has-text-align-center"><a href="https://justgilbey.co.uk/blog/backups/10-backup-statistics-every-business-needs-to-know/" target="_blank" rel="noreferrer noopener">10 Backup Statistics &#8211; every business should know</a></p>



<h2 class="wp-block-heading"><strong>Realise, it is not always intended to be harmful or catastrophic.</strong></h2>



<p>A frequent misstep we hear frequently is &#8220;we don&#8217;t need to back up&#8221;, &#8220;We are safe&#8221;, &#8220;We haven&#8217;t had any ransomware attacks yet&#8221;, &#8220;Personnel understand not to open suspicious files&#8221;&#8230;but did you know that the most common data recovery is actually due to unintended errors?</p>



<p>Not to mention data corruption and then let&#8217;s discuss hardware failures, malicious recoveries are only the stories we get wind of when it makes the news.</p>



<h2 class="wp-block-heading"><strong>It’s as easy as 3-2-1 backup.</strong></h2>



<p>One of the primary reasons why people don&#8217;t keep backups is because they are unaware of the correct procedure.</p>



<p>The 3-2-1 rule is usually recommended; three copies of your data, stored on two distinct mediums, with one located away from the original source.</p>



<p>A lot of people make a mistake by having just one copy of their files. Without a doubt, this is better than nothing, however having two additional replicas considerably decreases the probability of data loss.</p>



<p>It is essential to save these on two distinct mediums, for example a USB flash drive and an external hard drive.<br>This will provide protection from any device failure. Furthermore, it is wise to keep one of the backups in a different place than the other ones.</p>



<p>By having various locations, you can protect yourself against fire, robbery or any other unfortunate incident in your workplace.</p>



<h2 class="wp-block-heading"><strong>Use Cloud Storage and File Sync Services.</strong></h2>



<p>You may be wondering &#8220;<strong>What if I don&#8217;t have access to another location to store a backup?</strong>&#8221; Fortunately, start-ups and small businesses can still use the 3-2-1 backup strategy approach without needing to rent out extra space.</p>



<p>Cloud storage offer an economical &#8211; yet secure &#8211; solution, providing organizations with the ability to store their documents on a remote server. These files are stored in datacentres that are managed by reliable companies such as Amazon and Microsoft.</p>



<p>If you are already making use of OneDrive, Google Drive or Dropbox to keep your documents and information, then these services could be a great selection for you due to the fact that they can be incorporated without difficulty.</p>



<p>Nonetheless, it is important to bear in mind that document and collaboration platforms such as these <strong><u>should not be viewed as a backup answer and must always be used in conjunction with other back-up techniques</u></strong>; in fact, Google and Microsoft both firmly recommend to keep your data using a third-party or alternate source.</p>



<p>For instance, we have our cloud backup solution storing data in Amazon (AWS) and Google (GCP), you can backup all of the above vendors and set up an offsite copy. It&#8217;s also a great choice as it stores multiple copies of the files.</p>



<h2 class="wp-block-heading"><strong>Monitor and Check up on them regularly.</strong></h2>



<p>It is highly beneficial to back up your data with a backup schedule, but it is equally important to ensure that you are routinely inspecting them.</p>



<p>Unless you take the time to test them, how can you be certain that they are operating as intended?</p>



<p>We suggest examining your backups at least once a month to every six months; this will guarantee that everything is running optimally and that all of your data can be retrieved if an emergency arises.</p>



<p>Nothing worse than when you need to restore, you find that it doesn&#8217;t work or that there is nothing there.</p>



<h2 class="wp-block-heading"><strong>Disaster recovery Plan.</strong></h2>



<p>It is important to create a plan for recovering from a disaster in order to minimize the amount of time your company will be without data if it is lost. A good disaster recovery plan should include the following:</p>



<p>1. Establish objectives and scope: Establish what type of disasters you’re preparing for, what systems need to be recovered, and who is responsible for recovery.<br>2. Identify critical systems: Identify which systems are mission-critical and need to be recovered as quickly as possible.<br>3. Develop backup strategies: Determine how often backups will be created, where they will be stored, and who is responsible for them.<br>4. Test the plan regularly: Regularly test your plan to make sure it works correctly in case of a disaster situation.<br>5. Train personnel: Make sure all personnel involved in the recovery process are trained on their roles and responsibilities in case of a disaster.<br>6. Develop a communication strategy: Create a strategy for communicating with stakeholders about the recovery process and any changes that may need to be made during or after the event.<br>7. Document procedures: Document each step of the recovery process so that personnel can easily follow it in case of an emergency situation. Having a backup of the information is useless if you don&#8217;t know how to access it again.</p>



<h2 class="wp-block-heading"><strong>Consider automation.</strong></h2>



<p>Manual backups are a great way to ensure your files are safe while keeping expenses low. This makes them a suitable choice for individuals and very small firms. Be mindful of possible drawbacks like sickness, forgetfulness, and only copying the data that select individuals deem important and not the firm as a whole.</p>



<p>It is wise to consider automating your backups sooner rather than later.</p>



<p>Automating your backups allows you to set up a backup schedule for when and how often they should be performed, saving you time and energy.</p>



<p>Automated backups can also help ensure that data is securely backed up in multiple locations, providing an extra layer of protection in the event of a disaster. Doing so ensures that no file will be overlooked. Copying files by hand is not only tedious, but it can also lead to mistakes being made.</p>



<h2 class="wp-block-heading"><strong>Our Little Secret.</strong></h2>



<p>Shhh&#8230;Keep it a secret that we don&#8217;t just &#8220;flip the switch&#8221; and have IT work like magic for our customers; in reality, all of these strategies are integrated into our services for every customer.</p>



<p>We program computers to reroute all files from Desktop, Documents, Pictures to cloud services such as OneDrive/SharePoint, from where we back up the files multiple times a day, not only their files but also their emails, Teams and SharePoint. (3-2-1 backup system).</p>



<p>Keeping track of the backups, notifies us of any likely issues with the backups and a Disaster Recovery Plan is established for when restorations are necessary, as well as frequent testing to make sure it works like a charm. Its almost like we created this piece based on what we do <img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>



<p><strong>This article offers a few suggestions for keeping backups and is not exhaustive. If you would like to explore your backup and disaster recovery plan further, </strong><a href="https://justgilbey.co.uk/backup-disaster-recovery/" target="_blank" rel="noreferrer noopener"><strong>please contact us</strong></a><strong>.</strong></p>
]]></content:encoded>
					
					<wfw:commentRss>https://justgilbey.co.uk/blog/business-continuity/7-tips-how-to-create-an-effective-data-backup-strategy-and-why-you-should/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Cyber Essentials UK Security Scheme for Businesses</title>
		<link>https://justgilbey.co.uk/blog/cybersecurity/the-essential-cyber-security-scheme-for-uk-businesses/</link>
					<comments>https://justgilbey.co.uk/blog/cybersecurity/the-essential-cyber-security-scheme-for-uk-businesses/#respond</comments>
		
		<dc:creator><![CDATA[David Gilbey]]></dc:creator>
		<pubDate>Wed, 27 Jul 2022 09:25:23 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.justgilbey.co.uk/?p=3007</guid>

					<description><![CDATA[UK businesses are increasingly under attack from cybercriminals, but many don&#8217;t have the necessary security measures in place to protect themselves. The Cyber Essentials scheme ... <a title="The Cyber Essentials UK Security Scheme for Businesses" class="read-more" href="https://justgilbey.co.uk/blog/cybersecurity/the-essential-cyber-security-scheme-for-uk-businesses/" aria-label="Read more about The Cyber Essentials UK Security Scheme for Businesses">Read more</a>]]></description>
										<content:encoded><![CDATA[
<p>UK businesses are increasingly under attack from cybercriminals, but many don&#8217;t have the necessary security measures in place to protect themselves.</p>



<p>The Cyber Essentials scheme is a government-backed certification that provides businesses with a basic level of protection against cyber-attacks.</p>



<p>Cyber Essentials certification is a must-have for any UK business!</p>



<h2 class="wp-block-heading">What is the Cyber Essentials scheme?</h2>



<p>Cyber Essential is a government-supported industry-led initiative that provides an effective framework for ensuring companies have a strong cybersecurity strategy.</p>



<p>The cyber essentials initiative will help businesses to have safer internet spaces and to provide more efficient online services to their employees and their staff.</p>



<p>Cyber Essentials can protect your information networks against the most basic breaches and can be installed by a certified partner.</p>



<p>The scheme is designed to help businesses reduce their exposure to the most common cyber threats by implementing well known and basic security practices that will prevent majority of common cyber threats.</p>



<p>It will also provide them with guidance on how to implement basic security controls.</p>



<p>Cyber Essentials is not a silver bullet, but it does provide a good foundation for cybersecurity.</p>



<p>The certification process is comprising of a self-assessment questionnaire, and or technical audit via cyber essentials partner.</p>



<h2 class="wp-block-heading">Five Cyber Security measures</h2>



<p>There are five basic security controls that you need to implement to protect your business from the most common cyber-attacks:</p>



<h3 class="wp-block-heading">1. Firewalls</h3>



<p>Firewalls are essential for protecting your business from cyber-attacks. You should use a firewall to protect your computer and your network from unauthorized access.</p>



<h3 class="wp-block-heading">2. Antivirus Software</h3>



<p>Antivirus software is essential for protecting your business from malware and other malicious software. You should ensure that all of your computers have up-to-date antivirus software installed.</p>



<h3 class="wp-block-heading">3. Patch Management</h3>



<p>Patch management is essential for keeping your software up-to-date. Patching your software regularly helps to close security vulnerabilities that could be exploited by cybercriminals.</p>



<h3 class="wp-block-heading">4. User Access Control</h3>



<p>User access control is essential for preventing unauthorized access to your systems. You should ensure that only authorized users have access to your systems and that they only have the permissions that they need.</p>



<h3 class="wp-block-heading">5. Data Encryption</h3>



<p>Data encryption is essential for protecting your data from unauthorized access. You should ensure that all of your data is encrypted and that only authorized users have access to the encryption keys.</p>



<p>Cyber security measures like these are essential for protecting your business from cyber-attacks.</p>



<h2 class="wp-block-heading">Cyber Essentials Certification</h2>



<p>Cyber Essentials certification is a government-backed certification that demonstrates that your business meets the cyber security standards set by the National Cyber Security Centre (NCSC).</p>



<p>To become certified, you must pass an external assessment of your cyber security controls.</p>



<p>The cyber essentials partner will review your systems and give you a report outlining any areas where you need to improve the organisation&#8217;s cyber security level.</p>



<p>Once you have addressed any areas of improvement, you can apply for and achieve certification.</p>



<p>Becoming certified under the Cyber Essentials scheme shows that you are committed to protecting your business from phishing attacks, malware attacks, cyber fraud &#8211; and anything that can compromise sensitive and personal information.</p>



<p>It also provides customers and clients with reassurance that you take their cybersecurity seriously.</p>



<p>Cyber Essentials is mandatory for businesses looking for specific UK government contracts</p>



<h2 class="wp-block-heading">Tell me the difference between Cyber Essentials Plus Certification?</h2>



<p>The main difference between the two, is that the Cyber Essentials is pretty much a self assessed questionnaire that an assessor asks you a few questions about.</p>



<p>The Plus goes one step further and performs an external vulnerability scan, as well as either a remote or onsite vulnerability scan and an assessor that independently verifies different areas of the controls to ensure they match what you have said on the forms.</p>



<p>The cyber essentials plus certification package contains downloadable self-assessment questionnaires and cyber essentials branding tools for businesses including website email and cyber essentials certification valid 12 months upon successful application.</p>



<p>Organizations can use the Cyber Essentials Plus logo on their website and in their marketing materials to show that they are committed to protecting themselves against cyber-attack.</p>



<h3 class="wp-block-heading">The benefits of Cyber Essentials certification for businesses are:</h3>



<ul class="wp-block-list">
<li>Improved cyber security</li>



<li>A competitive advantage over businesses that are not certified</li>



<li>Greater customer confidence</li>



<li>Reduced insurance premiums</li>



<li>Government contracts pre-qualifier</li>



<li>Industry supported scheme</li>
</ul>



<p>Your organization will benefit from the fact that Cyber Essentials will show that you take security seriously, not to mention that Government tenders and other Public services all require Cyber Essentials in order to be considered.</p>



<p>Insurance companies are quickly starting to require Cyber Essentials as part of insurance, or offer discounted premiums, major search engines prefer websites that have been certified by a credible cyber security scheme; subjected to a technical audit, vulnerability scan, and assessment process.</p>



<p>Cyber Essentials provides clear guidance; technical controls and protection &#8211; that sets out a cyber security requirement that enables organisations to protect organisations from cyber-attacks.</p>



<h2 class="wp-block-heading">Why Cyber Essentials is important for SMEs?</h2>



<p>Any organisation can be vulnerable to cyber-attacks. Most of the cyber criminals or &#8220;bots&#8221; the scour thousands of systems per minute, they do not necessarily know how big or small you are.</p>



<p>Suppliers and third parties are also part of the wider ecosystem. The ecosystem is interconnected. Cyber security breaches are felt throughout the supply chain for micro-businesses.</p>



<p>To prevent cyber terrorism and other forms of cyberattack, larger organisations or new business have to identify and implement key controls following an on-site assessment.</p>



<h2 class="wp-block-heading">The Cyber Essentials Certification process</h2>



<p>The first step is to take a look at the Cyber Essentials Self Assessment Questionnaire or contact a company that specialises in Cyber Essentials.</p>



<p>Once the assessment has been completed, the Certification Body will provide you with a Cyber Essentials Certificate if you are compliant.</p>



<p>You can then proudly display your Cyber Essentials Certificate on your website and in other marketing materials to show that your business is committed to cyber security.</p>



<p>The Cyber Essentials scheme is a simple but effective way for businesses to protect themselves against the most common cyber-attacks.</p>



<p>If you are not already certified, we strongly recommend that you consider doing so.</p>



<p>It could be the difference between surviving a cyber-attack and becoming another statistic.</p>



<h2 class="wp-block-heading">Do you need help with your assessment?</h2>



<p>Some questions in Cyber Essentials self-assessments are very hard to comprehend if one isn&#8217;t technically skilled in computer technology or has a complicated organisation structure.</p>



<p>Here at <a href="https://justgilbey.co.uk/cyber-security/" target="_blank" rel="noreferrer noopener">Just Gilbey Managed IT Solutions</a> we have cybersecurity experts who can help you understand these evaluation questions related to your company and the steps you must take to obtain certification.</p>



<p>As part of our managed solutions, we already put in place procedures and solutions that are Cyber Essentials aligned and therefore offer a discount on Cyber Essentials certification, as well as your day to day IT Support and Office 365 subscriptions, all included into 1 monthly price.</p>



<h2 class="wp-block-heading">Eliminate the threat</h2>



<p>Reach out to a certified body for a technical audit or opt for the self-assessment option today!</p>



<p>Regardless of choice, you must have a clear picture of the controls required to safeguard your organisation and eliminate the risk of cyber-attack.</p>



<h2 class="wp-block-heading">FAQ</h2>



<h3 class="wp-block-heading">What is included in Cyber Essentials?</h3>



<p>The Cyber Essentials scheme is a government-backed cyber security certification that provides UK businesses with a basic level of protection against cyber-attacks.</p>



<h3 class="wp-block-heading">Is Cyber Essentials worth having?</h3>



<p>Yes &#8211; it demonstrates to your customers that you take cyber security seriously and have taken measures to protect their data.</p>



<p>It can help you win tenders for government contracts, as many government agencies now require contractors to be</p>



<h3 class="wp-block-heading">What is the difference between ISO 27001 and Cyber Essentials?</h3>



<p>ISO 27001 is a comprehensive international standard for information security that helps organizations protect their information and systems. In a nutshell it is a risk management system</p>



<p>Cyber Essentials is a government-backed cyber security certification that provides UK businesses with a basic level of protection against cyber-attacks. It is a lot &#8220;smaller&#8221; than ISO 27001 but the guidelines are non negotiable.</p>



<p>For example: Under ISO27001, a company may choose that to not patch/update their systems within 14 days and instead opt for 30 days and deem this an acceptable risk.</p>



<p>This same company would fail Cyber Essentials as the requirement is that all systems must be updated within 14 days for security related bugs/issues</p>



<h3 class="wp-block-heading">Do I need a Cyber Essentials partner?</h3>



<p>We would strongly recommend, Yes!</p>



<p>The Cyber Essentials certification is an self-evaluation survey, yet the questions and controls can be complex, so a lot of people try to do it alone. Unfortunately, they tend to struggle when it comes to providing technical information or understanding what is being asked. Working with a partner is advantageous in not only answering the questions precisely but also implementing the controls or processes and describing in straightforward terms what is needed.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://justgilbey.co.uk/blog/cybersecurity/the-essential-cyber-security-scheme-for-uk-businesses/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What Are the Best Ways to Give an Older PC New Life?</title>
		<link>https://justgilbey.co.uk/blog/productivity/what-are-the-best-ways-to-give-an-older-pc-new-life/</link>
					<comments>https://justgilbey.co.uk/blog/productivity/what-are-the-best-ways-to-give-an-older-pc-new-life/#respond</comments>
		
		<dc:creator><![CDATA[David Gilbey]]></dc:creator>
		<pubDate>Sat, 25 Jun 2022 12:00:00 +0000</pubDate>
				<category><![CDATA[IT Management]]></category>
		<category><![CDATA[Productivity]]></category>
		<guid isPermaLink="false">https://www.justgilbey.co.uk/?p=3242</guid>

					<description><![CDATA[Purchasing a new computer is a big investment. Many small businesses and home PC owners end up struggling with older systems because they want to ... <a title="What Are the Best Ways to Give an Older PC New Life?" class="read-more" href="https://justgilbey.co.uk/blog/productivity/what-are-the-best-ways-to-give-an-older-pc-new-life/" aria-label="Read more about What Are the Best Ways to Give an Older PC New Life?">Read more</a>]]></description>
										<content:encoded><![CDATA[
<p>Purchasing a new computer is a big investment. Many small businesses and home PC owners end up struggling with older systems because they want to get as many years out of them as possible.</p>



<p>Have you found yourself banging on your keyboard in frustration? Have you tried every tip and trick you found online, only to still struggle with a slow PC?&nbsp;</p>



<p>There are some promising upgrades you can do that will cost much less than the price of a new computer, while making your PC feel like new again.&nbsp;</p>



<p>Here are some of the options you can try to improve the performance of an older computer.</p>



<h3 class="wp-block-heading"><strong>Upgrade to a Solid-State Drive (SSD)</strong></h3>



<p>Prices for solid-state drives have come down quite a bit in the past few years, making them an affordable upgrade that can breathe life back into an older PC that might be slowing down.</p>



<p>Unlike hard disk drives (HDDs), SSDs do not have any moving parts and use a flash memory that allows for a quicker response time. You can improve your time to boot and your experience when searching files, opening applications, and other activities.&nbsp;</p>



<p>Some of the <a href="https://www.enterprisestorageforum.com/hardware/ssd-vs-hdd/" target="_blank" rel="noopener">advantages</a> of upgrading your computer’s hard drive to SSD include:</p>



<ul class="wp-block-list"><li>SSD read/write speeds up to 2500 MB/second compared to HDD at up to 200 MB/second</li><li>SSD access time of 0.1ms as compared to HDD at 5.5-8.0ms</li><li>SSDs use between 2-5 watts of energy compared to HDD at 6-15 watts</li></ul>



<h3 class="wp-block-heading"><strong>Increase the RAM (Memory)</strong></h3>



<p>One upgrade that is very low-cost and can mean a significant increase in performance is a memory upgrade. If your PC was one of the cheaper ones that only had 4GB of RAM when you bought it, you likely have trouble opening too many tabs in your browser or using any graphics-heavy program.</p>



<p>Upgrading your RAM, if your PC has available memory slots, to 8GB or 12GB can make it seem like you have an entirely new computer due to the big increase in speed.</p>



<h3 class="wp-block-heading"><strong>Upgrade the Graphics Card</strong></h3>



<p>If you play computer games or work in any type of video, imaging, or 3D software, an outdated graphics card can ruin your experience.&nbsp;</p>



<p>Instead of replacing your entire computer, just upgrading the graphics card to a more robust model can improve your PC’s performance and give you several more useful years from it.</p>



<h3 class="wp-block-heading"><strong>Replace Your PC Cooling System</strong></h3>



<p>Heat is an enemy of your computer’s internal parts. If your cooling system is getting worn out and not working the way it should be, then excess heat can be building up inside your device.</p>



<p>When this happens things can get strange, with programs crashing or your system rebooting on its own.</p>



<p>If you suspect excess heat may be an issue, have your computer’s fan and cooling system checked out to see if it needs replacing.</p>



<h3 class="wp-block-heading"><strong>Connect an External Monitor to a Laptop</strong></h3>



<p>If you’re working on a laptop and having a hard time multi-tasking due to limited screen real estate, consider getting an external monitor rather than replacing your entire PC.</p>



<p>Monitors are just a fraction of the cost of computers, and having a screen twice the size of the one on your laptop can make all the difference in the world and improve productivity due to the additional screen space.</p>



<h3 class="wp-block-heading"><strong>Replace Your Keyboard</strong></h3>



<p>Older keywords can stick, lose keys, and have the writing rubbed off the keys, making it more difficult to tell a “prt screen” from a “delete” button. If the performance of your PC is hampered by a frustrating keyboard, an upgrade can be a very inexpensive way to improve your equipment.</p>



<h3 class="wp-block-heading"><strong>Get an External Hard Drive</strong></h3>



<p>Computers can slow down and be more difficult to use when the hard drive fills up with data. Over the years, files build up, and many users never take the time to go through and delete those that are unnecessary.</p>



<p>Buying an external hard drive can allow you to offload files that may be slowing you down, while still keeping them easily accessible.</p>



<p>Another benefit of an external hard drive is that it’s portable and can easily be carried between home and work and used in both places.</p>



<h3 class="wp-block-heading"><strong>Get a Professional Computer Tune-Up</strong></h3>



<p>Those free PC cleaner tools you find online aren’t going to give you the type of tune-up that a professional IT provider can give. We will go through things like the Windows Registry, duplicate system files, internal errors, and more to clean up your system and remove all the “junk” that has built up over the years.</p>



<p>We can also do a maintenance check for things like failing parts, and provide expert guidance on your most impactful upgrade options.&nbsp;</p>



<h2 class="wp-block-heading"><strong>Get Help Improving Your Computer’s Performance Today!</strong></h2>



<p>Don’t struggle with an older PC! We can help you with cost-effective upgrade options that will fit your system and budget perfectly.</p>



<p></p>



<p>&#8212;<br><a href="https://pixabay.com/photos/laptop-mouse-stethoscope-notebook-1385702/" target="_blank" rel="noreferrer noopener">Featured Image Credit</a></p>


<p>This Article has been Republished with Permission from <a rel="canonical noopener" href="https://thetechnologypress.com/what-are-the-best-ways-to-give-an-older-pc-new-life/" title="What Are the Best Ways to Give an Older PC New Life?" target="_blank">The Technology Press.</a></p>]]></content:encoded>
					
					<wfw:commentRss>https://justgilbey.co.uk/blog/productivity/what-are-the-best-ways-to-give-an-older-pc-new-life/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft Teams Plan Comparison: Free vs M365 Business vs Teams Essentials</title>
		<link>https://justgilbey.co.uk/blog/microsoft/microsoft-teams-plan-comparison-free-vs-m365-business-vs-teams-essentials/</link>
					<comments>https://justgilbey.co.uk/blog/microsoft/microsoft-teams-plan-comparison-free-vs-m365-business-vs-teams-essentials/#respond</comments>
		
		<dc:creator><![CDATA[David Gilbey]]></dc:creator>
		<pubDate>Mon, 20 Jun 2022 12:00:00 +0000</pubDate>
				<category><![CDATA[Microsoft]]></category>
		<guid isPermaLink="false">https://www.justgilbey.co.uk/?p=3251</guid>

					<description><![CDATA[The shift to remote work over the last two years has caused companies to realign their digital tools. Now, many meetings default to being via ... <a title="Microsoft Teams Plan Comparison: Free vs M365 Business vs Teams Essentials" class="read-more" href="https://justgilbey.co.uk/blog/microsoft/microsoft-teams-plan-comparison-free-vs-m365-business-vs-teams-essentials/" aria-label="Read more about Microsoft Teams Plan Comparison: Free vs M365 Business vs Teams Essentials">Read more</a>]]></description>
										<content:encoded><![CDATA[
<p>The shift to remote work over the last two years has caused companies to realign their digital tools. Now, many meetings default to being via video conference rather than in person, and working from home has become commonplace.</p>



<p>Seventy-seven percent of remote workers say they’re more productive working from home (a big reason is fewer distractions). Plus <a href="https://findstack.com/remote-work-statistics/" target="_blank" rel="noopener">85% of</a> surveyed managers expect that having teams with remote workers will be the new normal.</p>



<p>But for remote working to work without employees feeling disconnected and customers feeling you’re hard to reach, you need to use cloud communication tools. One of the most popular, which has skyrocketed in popularity, is Microsoft Teams.</p>



<p><strong><em>Between April 2020 and April 2021, the Microsoft Teams daily active users count rose from 75 million </em></strong><a href="https://www.geekwire.com/2022/microsoft-teams-surpasses-270m-monthly-active-users-as-growth-slows-from-early-days-of-pandemic/" target="_blank" rel="noopener"><strong><em>to 145 million</em></strong></a><strong><em>.&nbsp;</em></strong></p>



<p>Teams is an all-in-one communication platform, providing more than just video conferencing or chat. It combines several capabilities into an online work hub for collaboration and communication.&nbsp;</p>



<p>Some of the key features of MS Teams include:</p>



<ul class="wp-block-list"><li>Video and audio calls</li><li>Webinar registration &amp; attendance reporting</li><li>Channeled team chat</li><li>File storage and sharing</li><li>In-app collaboration in Word, Excel, PPT, and more</li><li>In-app collaboration in 3<sup>rd</sup> party applications</li><li>Tabs that allow teams to link apps and websites inside a channel</li><li>Status notification and alerts</li><li>Use on all devices</li></ul>



<h2 class="wp-block-heading"><strong>MS Teams Evolution</strong></h2>



<p>Originally, Microsoft Teams was available only through a Microsoft 365 Business subscription. Then, to improve the popularity of Teams and compete with video conferencing platforms like Zoom, Microsoft brought out a free version with fewer features in 2018.</p>



<p>This helped the service increase its user base, however, there was a wide gap between the capabilities of the paid version with a Microsoft 365 subscription and the free version. Such as much less support, fewer features, etc.</p>



<p>Microsoft noted that it was missing a vital audience, the small business. Small business owners had a more difficult time fitting into either the free model, with very limited group meeting timing, or the paid model, which required a full M365 subscription.</p>



<p>So, in December of 2021, it brought out the third plan for MS Teams that it is hoping is “just right” for smaller companies that need the same collaboration and communication tools as everyone else. This plan is called <a href="https://www.microsoft.com/en-us/microsoft-365/blog/2021/12/01/new-microsoft-teams-essentials-is-built-for-small-businesses/" target="_blank" rel="noopener">Teams Essentials</a>, and you don’t need to sign up for Microsoft 365 to get it.</p>



<h2 class="wp-block-heading"><strong>Comparison of Teams Essentials vs Teams Free vs Teams with an M365 Business Plan</strong></h2>



<p>Next, we’ll go through the differences between these three MS Teams plans so you can identify the one that may make the most sense for your company.</p>



<h3 class="wp-block-heading"><strong>Microsoft Teams Free Version</strong></h3>



<p>The free version of MS Teams was really brought out to reach the residential and home user crowd. An audience that had been completely missing from the Teams userbase up to that point.</p>



<p>This plan has the following capabilities:</p>



<ul class="wp-block-list"><li>Unlimited group meetings for up to 60 minutes</li><li>Up to 100 participants per meeting</li><li>5GB of cloud storage per user</li><li>Unlimited chat</li><li>File sharing, tasks, and polling</li><li>Data encryption for calls, files, meetings, chats</li><li>Co-authoring capabilities</li><li>Ability to add tabs inside group channels</li></ul>



<p>The biggest drawback of using the free version for your business is the 60-minute limit on group video meetings. The 5GB cloud storage also can be limiting for business use of Teams.</p>



<h3 class="wp-block-heading"><strong>Microsoft Teams Essentials</strong></h3>



<p>Teams Essentials is $4/user/month and was designed specifically for small businesses that may not want to subscribe to M365, but still need a good cloud collaboration tool to keep their team connected and productive.</p>



<p>This plan has the following capabilities:</p>



<ul class="wp-block-list"><li>Everything in the free version, plus:</li><li>Unlimited group meetings for up to 30 hours</li><li>Up to 300 participants per meeting</li><li>10GB of cloud storage per user</li><li>Anytime phone and web support</li></ul>



<p>The additional group meeting time (up to 30 hours) is more than enough to fill any type of meeting need, even those that go on all day. Additionally, users get double the cloud storage space, and the phone and web support ensure your staff has help using the app when needed.</p>



<h3 class="wp-block-heading"><strong>Teams with Microsoft 365</strong></h3>



<p>The version of Teams with Microsoft 365 is available with any business plan. The lowest cost plan is $6.00/user/month ($2 more than Essentials). However, the Basic package does not come with downloadable Office apps (Word, Excel, etc.), only the web versions.</p>



<p>The next step up would be M365 Business Standard at $12.50/user/month, which is quite a bit more than the price for Teams Essentials. This one does include the downloadable Office apps.</p>



<p>These plans have the following capabilities:</p>



<ul class="wp-block-list"><li>Everything in the Essentials version, plus:</li><li>Office applications (either web or web &amp; downloadable)</li><li>All the many M365 cloud apps (OneDrive, Forms, SharePoint, OneNote, and many others)</li><li>1TB of cloud storage per user</li><li>Webinar hosting</li><li>Customer appointment management</li><li>Premium security features</li></ul>



<p>If you are planning to use Microsoft Office software and other applications, then it makes sense to get Teams along with an M365 subscription. However, if your business already owns the offline version of the Office suite or does not need it, then Teams Essentials offers a lot of capabilities with a lower price tag.</p>



<h2 class="wp-block-heading"><strong>Need Help Getting MS Teams or Other Cloud Tools Set Up?</strong></h2>



<p>Today’s hybrid offices and remote teams need robust collaboration tools to compete. Contact us if you need help getting started with MS Teams or another cloud tool. We’ll be happy to facilitate a custom setup to ensure your staff can hit the ground running.</p>



<p></p>



<p>&#8212;<br><a href="https://unsplash.com/photos/1Y-hk45tyMs" target="_blank" rel="noreferrer noopener">Featured Image Credit</a></p>


<p>This Article has been Republished with Permission from <a rel="canonical noopener" href="https://thetechnologypress.com/microsoft-teams-plan-comparison-free-vs-m365-business-vs-teams-essentials/" title="Microsoft Teams Plan Comparison: Free vs M365 Business vs Teams Essentials" target="_blank">The Technology Press.</a></p>]]></content:encoded>
					
					<wfw:commentRss>https://justgilbey.co.uk/blog/microsoft/microsoft-teams-plan-comparison-free-vs-m365-business-vs-teams-essentials/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Protect Your Online Accounts from Being Breached</title>
		<link>https://justgilbey.co.uk/blog/cybersecurity/how-to-protect-your-online-accounts-from-being-breached/</link>
					<comments>https://justgilbey.co.uk/blog/cybersecurity/how-to-protect-your-online-accounts-from-being-breached/#respond</comments>
		
		<dc:creator><![CDATA[David Gilbey]]></dc:creator>
		<pubDate>Wed, 15 Jun 2022 12:00:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.justgilbey.co.uk/?p=3254</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
					<wfw:commentRss>https://justgilbey.co.uk/blog/cybersecurity/how-to-protect-your-online-accounts-from-being-breached/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>6 Ways to Combat Social Phishing Attacks</title>
		<link>https://justgilbey.co.uk/blog/cybersecurity/6-ways-to-combat-social-phishing-attacks/</link>
					<comments>https://justgilbey.co.uk/blog/cybersecurity/6-ways-to-combat-social-phishing-attacks/#respond</comments>
		
		<dc:creator><![CDATA[David Gilbey]]></dc:creator>
		<pubDate>Fri, 10 Jun 2022 12:00:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.justgilbey.co.uk/?p=3268</guid>

					<description><![CDATA[Phishing is the number one method of attack delivery for everything from ransomware to credential theft. We are very aware of it coming by email, ... <a title="6 Ways to Combat Social Phishing Attacks" class="read-more" href="https://justgilbey.co.uk/blog/cybersecurity/6-ways-to-combat-social-phishing-attacks/" aria-label="Read more about 6 Ways to Combat Social Phishing Attacks">Read more</a>]]></description>
										<content:encoded><![CDATA[
<p>Phishing is the number one method of attack delivery for everything from ransomware to credential theft. We are very aware of it coming by email, but other types of phishing have been growing rapidly.</p>



<p>In recent years, phishing over social media has skyrocketed <a href="https://inspiredelearning.com/resource/social-media-phishing-infographic/" target="_blank" rel="noopener">by 500%</a>. There has also been a 100% increase in fraudulent social media accounts.</p>



<p>Phishing over social media often tricks the victims because people tend to let their guard down when on social platforms like Facebook, Instagram, Twitter, and LinkedIn. They’re socializing and not looking for phishing scams.</p>



<p>However, phishing scammers are out there looking for you and will reach out via friend requests and direct messages. Learn several ways you can secure your social media use to avoid these types of covert attacks.</p>



<h3 class="wp-block-heading"><strong>Make Your Profile Private on Social Platforms</strong></h3>



<p>Phishing scammers love public profiles on social media because not only can they gather intel on you to strike up a conversation, but they can also clone your profile and put up a fake page for phishing your connections.</p>



<p>Criminals do this in order to try to connect with those on your friends or connections list to send social phishing links that those targets will be more likely to click because they believe it’s from someone they know.</p>



<p>You can limit your risk by going into your profile and making it private to your connections only. This means that only someone that you’ve connected with can see your posts and images, not the general public.</p>



<p>For sites like LinkedIn where many people network for business, you might still want to keep your profile public, but you can follow the other tips below to reduce your risk.</p>



<h3 class="wp-block-heading"><strong>Hide Your Contacts/Friends List</strong></h3>



<p>You can keep social phishing scammers from trying to use your social media profile to get to your connections by hiding your friends or connections list. Platforms like <a href="https://www.linkedin.com/help/linkedin/answer/52/who-can-see-your-connections?lang=en" target="_blank" rel="noopener">LinkedIn</a> and <a href="https://www.facebook.com/help/115450405225661" target="_blank" rel="noopener">Facebook</a> both give you this privacy option.&nbsp;</p>



<p>Just be aware that this does not keep scammers from seeing you as a friend or connection on someone else’s profile unless they too have hidden their friends list.</p>



<h3 class="wp-block-heading"><strong>Be Wary of Links Sent via Direct Message &amp; in Posts</strong></h3>



<p>Links are the preferred way to deliver phishing attacks, especially over social media. Links in social posts are often shortened, making it difficult for someone to know where they are being directed until they get there. This makes it even more dangerous to click links you see on a social media platform.</p>



<p>A scammer might chat you up on LinkedIn to inquire about your business offerings and give you a link that they say is to their website. Unless you know the source to be legitimate, do not click links sent via direct message or in social media posts. They could be leading to a phishing site that does a drive-by download of malware onto your device.</p>



<p>Even if one of your connections shares a link, be sure to research where it is coming from. People often share posts in their own feeds because they like a meme or picture on the post, but they never take the time to check whether the source can be trusted.</p>



<h3 class="wp-block-heading"><strong>Don’t Participate in Social Media Surveys or Quizzes</strong></h3>



<p>While it may be fun to know what Marvel superhero or Disney princess you are, stay away from quizzes on social media. They’re often designed as a ploy to gather data on you. Data that could be used for targeted phishing attacks or identity theft.</p>



<p>The <a href="https://en.wikipedia.org/wiki/Facebook%E2%80%93Cambridge_Analytica_data_scandal" target="_blank" rel="noopener">Cambridge Analytica scandal</a> that impacted the personal data of millions of Facebook users did not happen all that long ago. It was found that the company was using surveys and quizzes to collect information on users without their consent.</p>



<p>While this case was high-profile, they’re by no means the only ones that play loose and fast with user data and take advantage of social media to gather as much as they can.</p>



<p>It’s best to avoid any types of surveys or quizzes on any social media platform because once your personal data is out there, there is no getting it back.</p>



<h3 class="wp-block-heading"><strong>Avoid Purchasing Directly from Ads on Facebook or Instagram</strong></h3>



<p>Many companies advertise on social media legitimately, but unfortunately, many scammers use the platforms as well for credit card fraud and identity theft.</p>



<p>If you see something that catches your eye in a Facebook or Instagram ad, go to the advertiser’s website directly to check it out, do not click through the social ad.</p>



<h3 class="wp-block-heading"><strong>Research Before You Accept a Friend Request</strong></h3>



<p>It can be exciting to get a connection request on a social media platform. It could mean a new business connection or connecting with someone from your Alma mater. But this is another way that phishing scammers will look to take advantage of you. They’ll try to connect to you which can be a first step before reaching out direct via DM.</p>



<p>Do not connect with friend requests without first checking out the person on the site and online using a search engine. If you see that their timeline only has pictures of themself and no posts, that’s a big red flag that you should decline the request.</p>



<h2 class="wp-block-heading"><strong>Can Your Devices Handle a Phishing Link or File?</strong></h2>



<p>It’s important to safeguard your devices with things like DNS filtering, managed antivirus, email filtering, and more. This will help protect you if you happen to click on a phishing link.</p>



<p>Find out how we can help!</p>



<p></p>



<p>&#8212;<br><a href="https://pixabay.com/vectors/phishing-credentials-data-login-6573326/" target="_blank" rel="noreferrer noopener">Featured Image Credit</a></p>



<p></p>


<p>This Article has been Republished with Permission from <a rel="canonical noopener" href="https://thetechnologypress.com/6-ways-to-combat-social-phishing-attacks/" title="6 Ways to Combat Social Phishing Attacks" target="_blank">The Technology Press.</a></p>]]></content:encoded>
					
					<wfw:commentRss>https://justgilbey.co.uk/blog/cybersecurity/6-ways-to-combat-social-phishing-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>4 Interesting Cloud Storage Trends to Watch for in 2022</title>
		<link>https://justgilbey.co.uk/blog/business-continuity/4-interesting-cloud-storage-trends-to-watch-for-in-2022/</link>
					<comments>https://justgilbey.co.uk/blog/business-continuity/4-interesting-cloud-storage-trends-to-watch-for-in-2022/#respond</comments>
		
		<dc:creator><![CDATA[David Gilbey]]></dc:creator>
		<pubDate>Sun, 05 Jun 2022 12:00:00 +0000</pubDate>
				<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Cloud]]></category>
		<guid isPermaLink="false">https://www.justgilbey.co.uk/?p=3248</guid>

					<description><![CDATA[One area of cloud computing that is used widely, but often isn’t as flashy as the software side is cloud storage. Storing files in the ... <a title="4 Interesting Cloud Storage Trends to Watch for in 2022" class="read-more" href="https://justgilbey.co.uk/blog/business-continuity/4-interesting-cloud-storage-trends-to-watch-for-in-2022/" aria-label="Read more about 4 Interesting Cloud Storage Trends to Watch for in 2022">Read more</a>]]></description>
										<content:encoded><![CDATA[
<p>One area of cloud computing that is used widely, but often isn’t as flashy as the software side is cloud storage. Storing files in the cloud to make them easily accessible and shareable from anywhere was one of the very first uses of the cloud that was adopted widely by many users.</p>



<p>As advances like automation and AI come to other types of cloud services, like team communications and business apps, cloud storage is not being left behind. The industry also continues to evolve to make storing data in the cloudless complex, more reliable, and better secured.</p>



<p>It’s estimated that in 2021, <a href="https://www.statista.com/statistics/1062879/worldwide-cloud-storage-of-corporate-data/" target="_blank" rel="noopener">50% of</a> all company data was stored in the cloud. This is an increase of 15% from just five years earlier. With today’s hybrid teams that may be working from home and be hundreds or thousands of miles away from co-workers, it’s important to centrally locate files in cloud systems that can be accessed by everyone.</p>



<p>What can you expect to see in the cloud storage market this year? Here are some of the most interesting trends to keep an eye on.</p>



<h3 class="wp-block-heading"><strong>1. Built-in Ransomware Defenses</strong></h3>



<p>Ransomware can impact data no matter where it is stored. Whether on a computer, server or in a cloud storage platform, this malware can encrypt the information and make it unreadable to the business that owns it.</p>



<p>In 2021, the average ransomware payment increased <a href="https://purplesec.us/resources/cyber-security-statistics/ransomware/" target="_blank" rel="noopener">by 82%</a> and ransomware incidents rose 64% during the first half of the year. A survey of CISOs found that over the last 18 months, <a href="https://www.darkreading.com/attacks-breaches/why-cloud-storage-isn-t-immune-to-ransomware" target="_blank" rel="noopener">98% of</a> organizations suffered a cloud data breach.</p>



<p>To combat ransomware, you’ll begin seeing cloud storage services offering ransomware recovery protection. This involves sophisticated systems that can help prevent files from being encrypted by code as well as those that take a copy of files and store it securely away, so files can be restored at the click of a button.</p>



<p>With ransomware showing no sign of stopping, this is a welcome addition in the cloud storage arena.</p>



<h3 class="wp-block-heading"><strong>2. “The Edge” Becomes More Key in Cloud Storage</strong></h3>



<p>One of the new buzzwords of the last few years has been “Edge” or “Edge computing.” This means bringing data applications and storage resources geographically closer to the user that needs to connect to them.</p>



<p>As reliance on cloud storage and other cloud applications has increased, so has the need to improve response times from user to server. When data must travel across large distances, it becomes more difficult to quickly and economically deliver the best user experience. Thus, cloud service providers have been moving to an Edge computing model.</p>



<p>What this means for you is better reliability and faster response when accessing or searching on files because your provider is going to work to provide your service from one of the company’s cloud servers that is geographically closer to your location.</p>



<p>For companies with offices spread out around a country or throughout the world, this means that you’ll want to keep service location in mind when signing up for cloud storage and have a discussion with the provider about distance and how Edge computing factors in.</p>



<h3 class="wp-block-heading"><strong>3. Expect More Help from AI and Machine Learning</strong></h3>



<p>AI and machine learning are making just about every area of technology smarter. Microsoft Word and text message apps now predict what you might type to help you fill in the blanks and type faster. Programs like Photoshop can crop around a person in an image in seconds using AI.</p>



<p>AI is also going to become more prevalent in cloud storage this year. You can expect help with automatic organization of your files based on your cloud storage patterns.&nbsp;</p>



<p>Look for features designed to eliminate manual or repetitive tasks to free up more time. This includes AI helping to automate things like provisioning, obtaining, and importing data (known as “ingesting”), managing data retention, and more.</p>



<h3 class="wp-block-heading"><strong>4. Legacy Vendors Begin Offering More Cloud Options</strong></h3>



<p>2022 is going to bring more cloud storage options coming from legacy technology providers. For example, Hewlett-Packard Enterprise recently introduced a new <a href="https://www.hpe.com/us/en/storage/data-services-cloud-console.html" target="_blank" rel="noopener">Data Services Cloud Console</a>, and Dell Technologies just announced a new <a href="https://www.dell.com/en-us/blog/a-better-way-to-multi-cloud/" target="_blank" rel="noopener">APEX multi-cloud</a> design that it is working on to improve the cloud ecosystem.</p>



<p>More cloud storage options mean you may need more help deciding which model will work best for you, as pricing will vary widely. You don’t want to end up with more storage than you need or be paying a lot for a smaller amount of space.</p>



<p>It pays to keep on top of new offerings and understand that every new cloud storage option might not be a fit for your organization’s specific data storage needs.</p>



<h2 class="wp-block-heading"><strong>Get Help Optimizing Your Cloud Storage &amp; Backup Environment</strong></h2>



<p>Your business data is what runs your company, and it needs to be stored securely and in a way that’s accessible. Find out how we can help you optimize your cloud storage to improve cost efficiency.</p>



<p></p>



<p>&#8212;<br><a href="https://pixabay.com/illustrations/upload-online-internet-files-cloud-3406226/" target="_blank" rel="noreferrer noopener">Featured Image Credit</a></p>


<p>This Article has been Republished with Permission from <a rel="canonical noopener" href="https://thetechnologypress.com/4-interesting-cloud-storage-trends-to-watch-for-in-2022/" title="4 Interesting Cloud Storage Trends to Watch for in 2022" target="_blank">The Technology Press.</a></p>]]></content:encoded>
					
					<wfw:commentRss>https://justgilbey.co.uk/blog/business-continuity/4-interesting-cloud-storage-trends-to-watch-for-in-2022/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>5 Things You Should Never Do on a Work Computer</title>
		<link>https://justgilbey.co.uk/blog/cybersecurity/5-things-you-should-never-do-on-a-work-computer/</link>
					<comments>https://justgilbey.co.uk/blog/cybersecurity/5-things-you-should-never-do-on-a-work-computer/#respond</comments>
		
		<dc:creator><![CDATA[David Gilbey]]></dc:creator>
		<pubDate>Tue, 31 May 2022 12:00:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.justgilbey.co.uk/?p=3051</guid>

					<description><![CDATA[Whether you work remotely or in an office, the line between personal and work tasks can become blurred when working on your company computer. If ... <a title="5 Things You Should Never Do on a Work Computer" class="read-more" href="https://justgilbey.co.uk/blog/cybersecurity/5-things-you-should-never-do-on-a-work-computer/" aria-label="Read more about 5 Things You Should Never Do on a Work Computer">Read more</a>]]></description>
										<content:encoded><![CDATA[
<p>Whether you work remotely or in an office, the line between personal and work tasks can become blurred when working on your company computer. If you’re in front of a computer for most of your time during work, then it’s not unusual to get attached to your desktop PC.</p>



<p>Over time, this can lead to doing personal things on a work computer. At first, it might just be checking personal email while on a lunch break. But as the line continues to get crossed, it can end up with someone using their work computer just as much for personal reasons as work tasks.</p>



<p>In a survey of over 900 employees, it was found that <a href="https://blog.malwarebytes.com/malwarebytes-news/2020/10/work-devices-for-personal-use/" target="_blank" rel="noopener">only 30%</a> said they never used their work PC for personal activities. The other 70% admitted to using their work computer for various personal reasons.</p>



<p>Some of the non-work-related things that people do on a work computer include:</p>



<ul class="wp-block-list"><li>Reading and sending personal email</li><li>Scanning news headlines</li><li>Shopping online</li><li>Online banking</li><li>Checking social media</li><li>Streaming music</li><li>Streaming videos/movies</li></ul>



<p>It’s a bad idea to mix work and personal, no matter how much more convenient it is to use your work PC for a personal task during the day. You can end up getting reprimanded, causing a data breach at your company, or possibly losing your job.</p>



<p>Here are several things you should never do on your work PC.</p>



<h3 class="has-text-align-center wp-block-heading"><strong>1. Save Your Personal Passwords in the Browser</strong></h3>



<p>Many people manage their passwords by allowing their browser to save and then auto-fill them. This can be convenient, but it’s not very secure should you lose access to that PC.</p>



<p>When the computer you use isn’t yours, it can be taken away at any time for a number of reasons, such as an upgrade, repair, or during an unexpected termination.</p>



<p>If someone else accesses that device and you never signed out of the browser, that means they can leverage your passwords to access your cloud accounts.</p>



<p>Not all older PCs are stored in a storeroom somewhere or destroyed. Some companies will donate them to worthy causes, which could leave your passwords in the hands of a stranger if the PC hasn’t been wiped properly.</p>



<h3 class="has-text-align-center wp-block-heading"><strong>2. Store Personal Data</strong></h3>



<p>It’s easy to get in the habit of storing personal data on your work computer, especially if your home PC doesn’t have a lot of storage space. But this is a bad habit and leaves you wide open to a couple of major problems:</p>



<ul class="wp-block-list"><li><strong>Loss of your files:</strong> If you lose access to the PC for any reason, your files can be lost forever</li></ul>



<ul class="wp-block-list"><li><strong>Your personal files being company-accessible: </strong>Many companies have backups of employee devices to protect against data loss. So, those beach photos stored on your work PC that you’d rather not have anyone else see could be accessible company-wide because they’re captured in a backup process.</li></ul>



<h3 class="has-text-align-center wp-block-heading"><strong>3. Visit Sketchy Websites</strong></h3>



<p>You should assume that any activity you are doing on a work device is being monitored and is accessible by your boss. Companies often have cybersecurity measures in place like DNS filtering that is designed to protect against phishing websites.</p>



<p>This same type of software can also send an alert should an employee be frequenting a sketchy website deemed dangerous to security (which many sketchy websites are).</p>



<p>You should never visit any website on your work computer that you wouldn’t be comfortable visiting with your boss looking over your shoulder.</p>



<h3 class="has-text-align-center wp-block-heading"><strong>4. Allow Friends or Family to Use It</strong></h3>



<p>When you work remotely and your work computer is a permanent fixture in your home, it can be tempting to allow a friend or family member to use it if asked. Often, work PCs are more powerful than a typical home computer and may even have company-supplied software that someone wouldn’t purchase on their own.</p>



<p>But allowing anyone else to use your work computer could constitute a compliance breach of data protection regulations that your company needs to adhere to.</p>



<p>Just the fact that the personal data of your customers or other employees could be accessed by someone not authorized to do so, can mean a stiff penalty.</p>



<p>Additionally, a child or friend not well-versed in cybersecurity could end up visiting a phishing site and infecting your work device, which in turn infects your company cloud storage, leaving you responsible for a breach.</p>



<p><strong><em>At least </em></strong><a href="https://blog.malwarebytes.com/reports/2020/08/20-percent-of-organizations-experienced-breach-due-to-remote-worker-labs-report-reveals/" target="_blank" rel="noopener"><strong><em>20% of</em></strong></a><strong><em> companies have experienced a data breach during the pandemic due to a remote worker.</em></strong></p>



<h3 class="has-text-align-center wp-block-heading"><strong>5. Turn off Company-Installed Apps like Backups and Antivirus</strong></h3>



<p>If you’re trying to get work done and a backup kicks in and slows your PC down to a crawl, it can be tempting to turn off the backup process. But this can leave the data on your computer unprotected and unrecoverable in the case of a hard drive crash or ransomware infection.</p>



<p>Company-installed apps are there for a reason and it’s usually for cybersecurity and business continuity. These should not be turned off unless given express permission by your supervisor or company’s IT team</p>



<h2 class="has-text-align-center wp-block-heading"><strong>How Secure Is the Device You Use to Work from Home?</strong></h2>



<p>Whether you’re working remotely and worried about causing a data breach or are a business owner with multiple remote team members to secure, device protection is important. Schedule a device security checkup today.</p>



<p></p>



<p>&#8212;<br><a href="https://unsplash.com/photos/FlPc9_VocJ4" target="_blank" rel="noreferrer noopener">Featured Image Credit</a></p>


<p>This Article has been Republished with Permission from <a rel="canonical noopener" href="https://thetechnologypress.com/5-things-you-should-never-do-on-a-work-computer/" title="5 Things You Should Never Do on a Work Computer" target="_blank">The Technology Press.</a></p>]]></content:encoded>
					
					<wfw:commentRss>https://justgilbey.co.uk/blog/cybersecurity/5-things-you-should-never-do-on-a-work-computer/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Alarming Phishing Attack Trends to Beware of in 2022</title>
		<link>https://justgilbey.co.uk/blog/cybersecurity/alarming-phishing-attack-trends-to-beware-of-in-2022/</link>
					<comments>https://justgilbey.co.uk/blog/cybersecurity/alarming-phishing-attack-trends-to-beware-of-in-2022/#respond</comments>
		
		<dc:creator><![CDATA[David Gilbey]]></dc:creator>
		<pubDate>Wed, 25 May 2022 12:00:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.justgilbey.co.uk/?p=3054</guid>

					<description><![CDATA[In 2020, 75% of companies around the world experienced a phishing attack. Phishing remains one of the biggest dangers to your business&#8217;s health and well ... <a title="Alarming Phishing Attack Trends to Beware of in 2022" class="read-more" href="https://justgilbey.co.uk/blog/cybersecurity/alarming-phishing-attack-trends-to-beware-of-in-2022/" aria-label="Read more about Alarming Phishing Attack Trends to Beware of in 2022">Read more</a>]]></description>
										<content:encoded><![CDATA[
<p>In 2020, <a href="https://www.tessian.com/blog/phishing-statistics-2020/" target="_blank" rel="noopener">75% of</a> companies around the world experienced a phishing attack. Phishing remains one of the biggest dangers to your business&#8217;s health and well being because it’s the main delivery method for all types of cyber attacks.</p>



<p>One phishing email can be responsible for a company succumbing to ransomware and having to face costly downtime. It can also lead a user to unknowingly hand over the credentials to a company email account that the hacker then uses to send targeted attacks to customers.</p>



<p>Phishing takes advantage of human error, and some phishing emails use sophisticated tactics to fool the recipient into divulging information or infecting a network with malware.</p>



<p><strong><em>Mobile phishing threats skyrocketed </em></strong><a href="https://www.securitymagazine.com/articles/96430-mobile-phishing-threats-surged-161-in-2021" target="_blank" rel="noopener"><strong><em>by 161%</em></strong></a><strong><em> in 2021.</em></strong></p>



<p>Your best safeguards against the continuous onslaught of phishing include:</p>



<ul class="wp-block-list"><li>Email filtering</li><li>DNS filtering</li><li>Next-gen antivirus/anti-malware</li><li>Ongoing employee cybersecurity awareness training</li></ul>



<p>To properly train your employees and ensure your IT security is being upgraded to meet the newest threats you need to know what new phishing dangers are headed your way.</p>



<p>Here are some of the latest phishing trends that you need to watch out for in 2022.</p>



<h3 class="has-text-align-center wp-block-heading"><strong>Phishing Is Increasingly Being Sent via Text Message</strong></h3>



<p>Fewer people are suspicious of text messages than they are of unexpected email messages. Most phishing training is usually focused on the email form of phishing because it’s always been the most prevalent.</p>



<p>But cybercrime entities are now taking advantage of the easy availability of mobile phone numbers and using text messaging to deploy phishing attacks. This type of phishing (called “smishing”) is growing in volume.</p>



<p>People are receiving more text messages now than they did in the past, due in large part to retailers and service businesses pushing their text updates for sales and delivery notices.</p>



<p>This makes it even easier for phishing via SMS to fake being a shipment notice and get a user to click on a shortened URL.</p>



<h3 class="has-text-align-center wp-block-heading"><strong>Business Email Compromise Is on the Rise</strong></h3>



<p>Ransomware has been a growing threat over the last few years largely because it’s been a big money-maker for the criminal groups that launch cyberattacks. A new up-and-coming form of attack is beginning to be quite lucrative and thus is also growing.</p>



<p>Business email compromise (BEC) is on the rise and being exploited by attackers to make money off things like gift card scams and fake wire transfer requests.</p>



<p>What makes BEC so dangerous (and lucrative) is that when a criminal gains access to a business email account, they can send very convincing phishing messages to employees, customers, and vendors of that company. The recipients will immediately trust the familiar email address, making these emails potent weapons for cybercriminals.</p>



<h3 class="has-text-align-center wp-block-heading"><strong>Small Businesses Are Being Targeted More Frequently With Spear Phishing</strong></h3>



<p>There is no such thing as being too small to be attacked by a hacker. Small businesses are targeted frequently in cyberattacks because they tend to have less IT security than larger companies.</p>



<p>43% of all data breaches target small and mid-sized companies, and 40% of small businesses that become victims of an attack experience at least <a href="https://cybersecurity-magazine.com/10-small-business-cyber-security-statistics-that-you-should-know-and-how-to-improve-them/" target="_blank" rel="noopener">eight hours</a> of downtime as a result.</p>



<p>Spear phishing is a more dangerous form of phishing because it’s targeted and not generic. It’s the type deployed in an attack using BEC.</p>



<p>It used to be that spear-phishing was used for larger companies because it takes more time to set up a targeted and tailored attack. However, as large criminal groups and state-sponsored hackers make their attacks more efficient, they’re able to more easily target anyone.</p>



<p>A result is small businesses receiving more tailored phishing attacks that are harder for their users to identify as a scam.</p>



<h3 class="has-text-align-center wp-block-heading"><strong>The Use of Initial Access Brokers to Make Attacks More Effective</strong></h3>



<p>We just discussed the fact that large criminal groups are continually optimizing their attacks to make them more effective. They treat cyberattacks like a business and work to make them more profitable all the time.</p>



<p>One way they are doing this is by using outside specialists called Initial Access Brokers. This is a specific type of hacker that only focuses on getting the initial breach into a network or company account.</p>



<p>The increasing use of these experts in their field makes phishing attacks even more dangerous and difficult for users to detect.</p>



<h3 class="has-text-align-center wp-block-heading"><strong>Business Impersonation Is Being Used More Often</strong></h3>



<p>As users have gotten savvier about being careful of emails from unknown senders, phishing attackers have increasingly used business impersonation. This is where a phishing email will come in looking like a legitimate email from a company that the user may know or even do business with.</p>



<p>Amazon is a common target of business impersonation, but it also happens with smaller companies as well. For example, there have been instances where website hosting companies have had client lists breached and those companies sent emails impersonating the hosting company and asking the users to log in to an account to fix an urgent problem.</p>



<p>More business impersonation being used in phishing attacks mean users have to be suspicious of all emails, not just those from unknown senders.</p>



<h2 class="has-text-align-center wp-block-heading"><strong>Is Your Company Adequately Protected from Phishing Attacks?</strong></h2>



<p>It’s important to use a multi-layered strategy when it comes to defending against one of the biggest dangers to your business&#8217;s wellbeing. Get started with a cybersecurity audit to review your current security posture and identify ways to improve.</p>



<p></p>



<p>&#8212;<br><a href="https://pixabay.com/vectors/hacking-data-theft-online-fraud-6694207/" target="_blank" rel="noreferrer noopener">Featured Image Credit</a></p>


<p>This Article has been Republished with Permission from <a rel="canonical noopener" href="https://thetechnologypress.com/alarming-phishing-attack-trends-to-beware-of-in-2022/" title="Alarming Phishing Attack Trends to Beware of in 2022" target="_blank">The Technology Press.</a></p>]]></content:encoded>
					
					<wfw:commentRss>https://justgilbey.co.uk/blog/cybersecurity/alarming-phishing-attack-trends-to-beware-of-in-2022/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Important Steps to Take Before You Recycle a Mobile Phone Number </title>
		<link>https://justgilbey.co.uk/blog/cybersecurity/important-steps-to-take-before-you-recycle-a-mobile-phone-number/</link>
					<comments>https://justgilbey.co.uk/blog/cybersecurity/important-steps-to-take-before-you-recycle-a-mobile-phone-number/#respond</comments>
		
		<dc:creator><![CDATA[David Gilbey]]></dc:creator>
		<pubDate>Fri, 20 May 2022 12:00:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.justgilbey.co.uk/?p=3047</guid>

					<description><![CDATA[It’s not unusual to change a mobile number from time to time. For example, when you move, you may want a number that is local ... <a title="Important Steps to Take Before You Recycle a Mobile Phone Number " class="read-more" href="https://justgilbey.co.uk/blog/cybersecurity/important-steps-to-take-before-you-recycle-a-mobile-phone-number/" aria-label="Read more about Important Steps to Take Before You Recycle a Mobile Phone Number ">Read more</a>]]></description>
										<content:encoded><![CDATA[
<p>It’s not unusual to change a mobile number from time to time. For example, when you move, you may want a number that is local to the area you just moved to. Companies also may end up recycling mobile numbers throughout their staff as people come and go.</p>



<p>If you don’t properly detach your mobile phone number from all the accounts it’s used with, you can leave yourself open to identity theft, credit card fraud, and other crimes.</p>



<p>In a 2021 Princeton University study, it was found that <a href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank" rel="noopener">66% of</a> mobile numbers listed as available by major mobile service providers&nbsp;were still connected to accounts on popular sites (Amazon, PayPal, etc.).&nbsp; </p>



<p>So, after the former owners had turned in the number, it was available for someone else to use when signing up for mobile service. And that number was still being used on the former owner’s cloud accounts, allowing those accounts to easily be breached.</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><img decoding="async" src="https://justgilbey.co.uk/wp-content/uploads/2022/04/Princeton-University-Image.png" alt="Princeton University Image | | Just Gilbey IT Solutions Ltd" class="wp-image-606" title="Important Steps to Take Before You Recycle a Mobile Phone Number  1"><figcaption><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">P</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">r</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">i</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">n</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">c</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">e</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">t</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">o</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">n</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank"> </a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">U</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">n</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">i</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">v</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">e</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">r</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">s</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">i</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">t</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">y</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank"> </a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">s</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">t</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">u</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">d</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">y</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank"> </a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">o</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">n</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank"> </a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">t</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">h</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">e</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank"> </a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">r</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">i</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">s</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">k</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank"> </a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">o</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">f</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank"> </a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">r</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">e</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">c</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">y</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">c</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">l</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">i</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">n</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">g</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank"> </a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">m</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">o</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">b</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">i</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">l</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">e</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank"> </a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">n</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">u</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">m</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">b</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">e</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">r</a><a rel="noreferrer noopener" href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank">s</a><a href="https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf" target="_blank" rel="noreferrer noopener">.</a></figcaption></figure></div>



<p>Because our mobile numbers are connected to much of our online and offline life, it’s important to take certain steps to ensure that you don’t leave yourself at risk when recycling your phone number.</p>



<h3 class="has-text-align-center wp-block-heading"><strong>Change Your Phone Number for Online Accounts</strong></h3>



<p>We all generally have more online accounts than we immediately remember. The average person must juggle <a href="https://tech.co/password-managers/how-many-passwords-average-person" target="_blank" rel="noopener">100 passwords</a>, and most of those passwords will be to a website or cloud app service of some kind.</p>



<p>The first thing you want to do is begin visiting your online accounts and cloud applications to update your mobile phone number. Many of these apps now use a text message to your number as a form of verification if you’ve lost your password.</p>



<p>You want to ensure any password reset messages go to you and not someone that has requested your old number for the express purpose of identity theft or account compromise.</p>



<h3 class="has-text-align-center wp-block-heading"><strong>Change Your Number for Social Media Accounts</strong></h3>



<p>Technically, a social media account is also an online account, but many people think of them as a separate entity. When a Facebook or LinkedIn account is compromised, the hacker often will send social phishing messages out to your friend connections to try to gain access to sensitive data or scam them out of money.</p>



<p>Make sure to change the phone number listed in your social media accounts. If you are using WhatsApp, which is tied directly to your mobile number, make sure to follow their instructions on <a href="https://faq.whatsapp.com/iphone/account-and-profile/how-to-change-your-phone-number/" target="_blank" rel="noopener">changing your number</a> so your communications will remain secure.</p>



<h3 class="has-text-align-center wp-block-heading"><strong>Change Your Phone Number for Service Providers That Send You Texts</strong></h3>



<p>Text messaging is beginning to replace email for many types of communications. This includes things like shipping notices, confirmations of payments from utility companies, appointment reminders, and sale notices from retailers.</p>



<p>This puts you more at risk if you change your mobile number because the texts you receive from various service providers can be used for identity theft.</p>



<p>Make sure to connect with any services you use that contact you by calling or texting your mobile number to update your information. These offline services could be a:</p>



<ul class="wp-block-list"><li>Plumbing or HVAC company</li><li>Dentist or doctor’s office</li><li>Pharmacy</li><li>Local retailer</li><li>Utility company</li></ul>



<h3 class="has-text-align-center wp-block-heading"><strong>Double Check All Your Multi-Factor Authentication Prompts</strong></h3>



<p>One of the big dangers of having a stranger able to receive your text messages is that they could have access to your codes for multi-factor authentication (MFA).</p>



<p>MFA is designed as a safeguard to help prevent an account breach, even if the perpetrator has your username and password. But if the criminal gets the MFA codes sent to your old number, they can easily get in and change your password, locking you out of your own account.</p>



<p>As you go through the process to update your mobile number in your online accounts, double-check the MFA prompt for any that use this form of authentication security. You want to make sure it’s been properly changed to send a message to your new number.</p>



<h3 class="has-text-align-center wp-block-heading"><strong>Review Your Text Message History for Anything You’ve Missed</strong></h3>



<p>Inevitably, there will be online accounts or service providers that you’ve missed. For example, that place you always order flowers for on a loved one’s birthday every year but never visit at other times.</p>



<p>Scroll through your text message history to find any other accounts that you may have forgotten to update.</p>



<h3 class="has-text-align-center wp-block-heading"><strong>Text Friends, Family &amp; Colleagues from the New Number</strong></h3>



<p>Once your online security is taken care of, you want to stop friends, family, and colleagues from accidentally texting your old number. This can happen in both one-on-one and group SMS chats.</p>



<p>Send a text message from your new number asking them to immediately update your contact with that number when they receive it. Then go the additional step by asking them to delete any messages that used your old phone number. This can help prevent them from accidentally grabbing that message instead of your new one when texting you in the future.</p>



<h2 class="has-text-align-center wp-block-heading"><strong>How Secure Is Your Mobile Device?</strong></h2>



<p>Mobile devices are increasingly being attacked by malware and phishing. Is your device properly secured? Don’t leave yourself at risk, request a mobile security check to protect your personal data and identity.</p>



<p></p>



<p>&#8212;<br><a href="https://www.pexels.com/photo/anonymous-person-showing-recycle-symbol-on-smartphone-3850542/" target="_blank" rel="noreferrer noopener">Featured Image Credit</a></p>


<p>This Article has been Republished with Permission from <a rel="canonical noopener" href="https://thetechnologypress.com/important-steps-to-take-before-you-recycle-a-mobile-phone-number/" title="Important Steps to Take Before You Recycle a Mobile Phone Number&nbsp;" target="_blank">The Technology Press.</a></p>]]></content:encoded>
					
					<wfw:commentRss>https://justgilbey.co.uk/blog/cybersecurity/important-steps-to-take-before-you-recycle-a-mobile-phone-number/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 

Served from: justgilbey.co.uk @ 2026-03-16 20:01:30 by W3 Total Cache
-->