The Macnamara Blog

AI Support 09
Macnamara blog

IT Support vs IT Security – Are You Getting The Service You Deserve?

Small businesses are just as vulnerable – if not more so – as larger organisations to cyberattacks, data breaches, and other IT-related issues (including simply poorly maintained equipment) that can compromise their operations, reputation, and profitability. They also need an occasional helping hand with some of the more everyday helpdesk issues that arise, be they problems, or simply helping to get new staff set up on the systems.

Read More »
Best practices

What is Information Management and Information Security?

Before the cloud, when businesses were primarily working from an office, they knew where their information was, how people could access it, how it was backed up and how it was protected. Now since we’re ever increasingly working in the cloud and from multiple remote locations, it’s less clear. This can cause all sorts of problems and headaches for businesses, including a heightened risk of becoming the victim of fraud through to non-compliance with your legal and regulatory obligations.

Read More »
Unlocked Padlock
Best practices

Why You Shouldn’t Mix Personal and Business Browsing

Using browser profiles is extremely useful. It allows you to sign in on multiple devices and get the same bookmarks, passwords, and history across your devices. BUT, you should never use the same profile for work that you use for your personal browsing, and for good reason.

Read More »
Email Signature
Best practices

Why Use Managed Email Signatures?

While email signatures are not (let’s face it) the most glamourous aspect of IT, they are however often overlooked and under-appreciated. Not only can they be great for branding, they can even be used as an important element of your company security. There are also some regulatory reasons to have a signature on company emails too. ‘How can my email signature contribute to my security’ you ask? Good question!

Read More »
Cyber Criminal
Macnamara blog

Could You Have Been Breached And Not Even Know It?

If your account is breached, how would you know? A clever cybercriminal, on gaining access to an account, would not necessarily take immediate action. They may linger for some time, taking advantage of their access to explore what you have access to, examine your data, and read your email transactions, waiting for the moment to pounce. In this article by one of our security partners, we dispel some myths and examine some scary truths about how malicious actors take advantage of access.

Read More »
Best Practice
Best practices

How do you know if your IT company is doing the right things for your business?

Reviewing your IT Support is something that all businesses, large and small, should do periodically. IT is an ever evolving environment and the rapid pace of change presents new opportunities as well as threats. Yet, IT Support is a very different thing from IT Security. At Macnamara, we’re clear on the distinction. We do both, but they are NOT the same thing. In this great article by one of our security partners, we highlight some of the things you should consider when reviewing your service or choosing a new one.

Read More »
Thumb Print Key
Best practices

Biometrics: Face The Future Of Digital Security

With 4 in 10 small businesses and a quarter of charities reporting cyber security breaches in the last 12 months * it’s more important to protect your personal and company data than ever before. With the increasing rise in cyber-attacks and data breaches, relying on a password alone can leave your computers, mobile devices, and online accounts in a vulnerable state. This is where passwordless sign-in can save the day.

Read More »
ChatGPT CE
Cloud Services

What Does ChatGPT Know About Cyber Essentials?

A day doesn’t go by when AI, and ChatGPT in particular, are not in the news. The Large Language Model (LLM) has absorbed every word on the internet up to the year 2021 and as a result it’s able to answer all manner of questions as well as write content for you based on the simplest of queries. It even threatens the once dominant status of Google as THE go to source of information. Curious, I asked it why Cyber Essentials is good for small business. Here’s what it said.

Read More »
Unsecured Network
Best practices

Stay Safe Online: Why Public WiFi is a Risk You Can’t Ignore

Love using public WiFi? Beware! It can be dangerous. From hackers to identity theft, public WiFi can leave you vulnerable to all kinds of online threats. But do not worry, I have your back! In this blog, I will show you why public WiFi is so risky and give you some easy tips to stay safe. So, before you connect to that free WiFi hotspot, read on to find out how to protect yourself!

Read More »
Small people cleaning a processor
Hardware

What Does It Mean To Say “My Computer Is Supported By Macnamara”?

At Macnamara, we like to say that we support people, not machines. And, of course, that is true. We support people who use computers, and we help them to get past the problems that their computers throw up. Every now and again though, when no one is watching, we drop what we learned in Marketing 101 for Small Businesses, and admit that we love computers and we do in fact support computers as well as people (who we love even more).

Read More »
CEO Fraud
Best practices

CEO Fraud – How It Works

CEO fraud is up there, along with phishing and ransomware, in the top three cyber threats facing small businesses. CEO fraud comes in a variety of more or less sophisticated forms, but most commonly appears as a forged email or SMS message purporting to come from the CEO or other senior person and asking for money to be transferred to meet some urgent requirement.

Read More »
Password Manager
Best practices

LastPass Password Manager

Password management can be a bit of a nightmare. We’re always told to use complex passwords that are hard to guess, and to never re-use passwords. But, in practice this can be a challenge to remember them all! Most of us may have dozens if not hundreds of online services that require a username and password to access. How on Earth are we supposed to have a different complex password for them all and be expected to remember them without writing them down?

The good news is, you don’t have to remember them, or write them down!

Read More »
Fax machine
Macnamara blog

You have a new Fax!

When was the last time you received a fax? Possibly never. But, it might surprise some of you to know that millions of faxes get sent every day. In Germany, Japan and the US especially, they are alive and well, if not so much here in the UK. But how are they used in Phishing?

Read More »
CE IASME
Macnamara blog

Information Security

You can’t have IT without Security!

There, we said it, but what does that mean and perhaps more importantly, what does it mean for our customers?

Read More »
Break/Fix
Macnamara blog

Is The MSP (Managed Services Provider) Model Broken?

The evolution of the MSP started in the 1990s with the emergence of application service providers (ASPs) who helped pave the way for remote support for IT infrastructure. From the initial focus of remote monitoring and management of servers and networks, the scope of an MSP’s services expanded to include mobile device management, managed security, remote firewall administration and security-as-a-service, and managed print services.

Read More »
DPD
Macnamara blog

Credit Card Fraud: Missed Delivery

Continuing our expose on Phishing, let’s take a look at this real example of a common scam where you’re asked to enter bank card details to re-schedule a missed delivery.

Read More »
Phishing
Best practices

Phishing – How Does It Work?

Everyone gets phishing emails. Unfortunately they’re everywhere. Most get filtered through to your junk folder or caught before they are even delivered, but some still get through. But what they are and how they work isn’t always clear. Here we’ll try to de-mystify an all too common and potentially dangerous nuisance.

Read More »
Best practices

Why you need a secure password

A strong password is essential for preventing others from gaining unauthorised access to your account or device. The stronger the password the more difficult it will be for a hacker to crack.

Read More »
Best practices

How to make a secure password

It can be hard to think of a password that you can remember when you need it, let alone multiple passwords and variations. What can make this is easier is using a methodology or naming convention for your passwords.

Read More »
Scroll to Top