Archive

  • News
  • Oct

Fifosys maintains their ISO 27001 certification for the 8th year running

We are pleased to announce that London based MSP, Fifosys, has maintained their ISO27001 certificati

Read More
  • News
  • Oct

Fifosys Ranked Among World’s Most Elite 501 Managed Service Providers

Fifosys has been named as one of the world’s premier managed service providers on the prestigious 12

Read More
  • Business
  • Oct

How End User Support Can Transform Business Efficiency

The importance of having access to high-quality end user IT support is sometimes overlooked, especia

Read More
  • Business
  • Oct

6 Benefits of Leasing Your IT Equipment

Most businesses have a lot of different expenses to contend with, but one of the biggest will usuall

Read More
  • Business
  • Oct

Proud: Innovations in Business

For businesses in the UK, 2020 has been a year unlike any other and the COVID-19 pandemic brought wi

Read More
  • Business
  • Oct

Why Your MSP Should be the Support Service You Retain at All Costs

The outbreak of COVID-19 has led to major economic consequences and the effects are likely to be fel

Read More
  • Business
  • Oct

Why Customer Success is at the Core of Everything

You might have come across the term 'customer success' during business operations. It has become a v

Read More
  • Business
  • Oct

What Are the Key Focus Areas When Getting Multiple Retail Branches Opened at Pace?

For any retail business opening multiple branches at pace, there are a number of significant challen

Read More
  • Business
  • Oct

Is the NHS in Need of a Health-check of its Own IT Systems?

Healthcare is one sector that is slowly but steadily adapting to technological advances. The UK Nati

Read More
  • Business
  • Oct

Why The Healthcare Sector is Due for Technological Disruption

Technological disruption hit just about every sector, from banking to retail. Healthcare is one area

Read More
  • Business
  • Oct

Top 5 Challenges Currently Facing the Retail Sector

Every market has its portion of challenges, and any entrepreneur should know this. The retail sector

Read More
  • Business
  • Oct

What is the Difference Between Managed Services and Outsourcing?

The terms "managed services" and "outsourcing" are sometimes used interchangeably and thought about

Read More
  • Business
  • Oct

How prepared Is Your Business For GDPR?

How prepared Is Your Business For GDPR?

Read More
  • Security
  • Oct

The Indisputable Benefits of Cyber Security Awareness Training

It is difficult to overstate the extent of the challenge that small and medium enterprises face in m

Read More
  • Security
  • Oct

Crisis Management and Emergency Planning: Are you Fully Prepared?

The outbreak of COVID-19 has forced many businesses into a level of crisis and emergency response th

Read More
  • Security
  • Oct

10 Top Tips about Security Awareness for Businesses

Cyber security awareness training is a critical element that every business should take seriously. T

Read More
  • Oct

Dissecting the Difference Between an MSP and MSSP

When sourcing small business IT support, you will realise that there lies a difference between the m

Read More
  • Security
  • Oct

Why More Cyber Security Experts Should be in the Boardroom in All Sectors

Cyber security has never been as vital as it is now. Companies, even the ones that pride themselves

Read More
  • Security
  • Oct

Cyber Security Within the Retail Sector – How to Ensure You Remain Secure

Modern consumers are increasingly concerned about the data they provide to online retailers and how

Read More
  • Security
  • Oct

The Rise of Social Engineering Attacks and Why You Must Be Vigilant

Cyber security threats of all kinds are on the rise, but as individuals and businesses become more a

Read More
  • Security
  • Oct

Why You Should Take Your Cyber Security Seriously

If it feels like you are seeing cyber security issues in the news almost every single day, it is bec

Read More
  • Security
  • Oct

Thanks for having us Legalex!

We recently spent a few days out of office to participate at Legalex Cyber Security Expo at the Lond

Read More
  • Oct

Security is not just a logo for your website!

Security is a daunting word. However, security is of paramount importance for any business.

Read More
  • Security
  • Oct

Fifosys @ Legalex in 2018!

For the first time in 2018, Legal Cyber Security will be running within Legalex. Legal Cyber Securit

Read More
  • Security
  • Oct

Three basic steps to protect your data

Cyber Security Centre race to prepare for future cyber-attacks. How protected is your Data?

Read More
  • Security
  • Oct

Your business could face £17m fines for inadequate cyber security

UK Businesses could lose 4% of global turnover for negligence in modernizing their cyber security de

Read More
  • Security
  • Oct

Ransomware Worldwide - Who is at fault?

Ransomware spreads worldwide and the blame game is in full swing. Jeremy Hunt warned the NHS in 2016

Read More
  • Security
  • Oct

Preventing Ransomware is easier than removing it

Malicious software hit Britain’s National Health Service as well as companies in Russia, Spain, Ukra

Read More
  • Security
  • Oct

Can your business cope with a cyber attack?

If national institutions in the UK can so easily be hit by ransomware described by Marcus Hutchins a

Read More
  • Security
  • Oct

The Need for Offensive and Defensive IT support

Ransomware recently infiltrated universities, railway companies, car factories and government depart

Read More
  • Security
  • Oct

Hackers can Access your data

Online criminals access your IT Infrastructure with the use of problem solving skills. With every ha

Read More
  • Security
  • Oct

Be smart. Update your operating systems.

Like Predators watching hordes of prey for hours on end. They eye up the weak. Patiently waiting bef

Read More
  • Security
  • Oct

Are your remote workers putting your business at risk?

How often do your staff work remotely? How secure is their internet connection?

Read More
  • Security
  • Oct

5 simple ways you can mitigate social cyber threats

Social threats like identity theft, social engineering, phishing, vishing, smishing, scams, cons, do

Read More
  • Security
  • Oct

Automate the pain away - Automate your patch management with Fifosys!

Keeping up to date with the latest security patches for your end-user environment is of huge importa

Read More
  • Security
  • Oct

The importance of encryption

Smart decisions relating to privacy and security are made when decision maker's have a grasp of how

Read More
  • Security
  • Oct

Will GDPR change the way content censorship is regulated in the UK?

Internet censorship isn't exclusive to places in the middle and far east like Iran and China. It exi

Read More
  • Security
  • Oct

Hackers are attacking your WiFi - Here's how to protect yourself

The latest severe security vulnerability was made public yesterday. It’s crucial you’re all aware so

Read More
  • Security
  • Oct

Is the decision to weaken encryption too technical for those in power?

If they do get it, a reasonable mind will realise if encryption gets weakened for all - then there i

Read More
  • Security
  • Oct

Here's what you need to know about the Dark Net

A dark net is the everyday term for an encrypted, superimposed internet network which can only be us

Read More
  • Security
  • Oct

How to tell if a website is trying to hack you

However, turning away from anything technical is turning a blind eye to the possibility you could be

Read More
  • Security
  • Oct

The way to protect your business from phishing attacks

Businesses like yours and ours get studied all the time by hacking groups, preparing for a coordinat

Read More
  • Security
  • Oct

People's browser's get hacked all the time.. Here's how they do it

Your adversaries in the cyber sphere pose threats to you and your business in many forms. They have

Read More
  • Security
  • Oct

Strategies cyber criminals use to access your data

Typically a form of malware which seeks to take control of your computer, stealthily encrypting your

Read More
  • Security
  • Oct

"So much malware, what do I do?"

Malware is the common term covering all malicous programs written with the intent of obtaining data

Read More
  • Security
  • Oct

As a business owner, are you aware if..

If your staff possess the know-how to protect your business from cyber criminals? If your systems ar

Read More
  • Security
  • Oct

Pivotal factors that weaken your security

Considering a hacker spends more time contemplating how to penetrate weakened systems and how to ide

Read More
  • Security
  • Oct

The Top 3 things you need to stay safe online

If any of the above were in your top 3 then I have news for you - you are NOT doing the best things

Read More
  • Security
  • Oct

Why you need cyber security - How hackers value your data

How hackers value your data Why would someone want to hack you? What is the point of a hacker taking

Read More
  • Security
  • Oct

Any web app can infect your computer - Here's how to avoid the pitfalls

Most people nowadays are equipped with some form of computing device - laptop, desktop, smartphone o

Read More
  • Security
  • Oct

3 Fundamentals of Security

Building a perimeter of anti-virus applications is not feasible in this digital era as many anti-vir

Read More
  • Security
  • Oct

Which Wins... Security, Privacy Or Anonymity? You decide!

These days, life is like a reality show for all of us. The surge in popularity of social media platf

Read More
  • Security
  • Oct

The Cyber Security Landscape - Understanding the Threats and Mitigating the Risk

If an IT company promises you 100% Security for your data with 0% risk - remember they're 100% takin

Read More
  • Security
  • Oct

The Cyber Security Landscape - To what degree is your business at risk?

It is critical to know who your enemy is. ‘Better the devil you know’ as they say. If you have never

Read More
  • Security
  • Oct

The Cyber Security Landscape - Best Practices to Protect Your Business Data

What business owners consider to be valuable assets will vary from one business owner to another  bu

Read More
  • Security
  • Oct

If all computers are vulnerable, how strong are your security defences?

You should now understand the difference between Privacy, Anonymity and Pseudonymity. which should l

Read More
  • Security
  • Oct

Privacy or anonymity? - Which is more important in the digital era?

Technology is evolving quicker than most peoples’ ability to understand it; therefore it is increasi

Read More
  • cloud
  • Oct

The Cloud Question

These are key questions facing business owners and directors. You would not contemplate running a bu

Read More