FREE AUDIT 0203 865 7174

Top Security Tips – Self help IT & Cloud & Email Security


The following tips on how to protect your data and accounts from cybercrime. Below you will see a task repeat keeping your software up to date especially security updates will keep you safe.

  1. Make sure all your Windows, Linux, Google, and Apple computers are up to date with the latest Operating System patch.
  2. Do not use old Operating System prone to vulnerability, stability and hacking e.g., Microsoft Windows XP, Windows Vista, and Windows 7, this includes old version Apple and Linux Operating Systems.
  3. Keep your web browser up to date check monthly or quarterly most web browsers you click on help and about there will option to check for updates.
  4. Keep Microsoft Office any other Applications that connect to the Internet on the latest updates.
  5. Keep Smartphones and tablets on the latest security patches.
  6. Recommend antivirus for your Smartphone and tablets.
  7. You have actively paid antivirus recommendation Bitdefender, Avast, Kaspersky, and Symantec (Norton).
  8. Antivirus installed on all computers and servers.
  9. Antivirus/malware protection scan at least monthly and schedule or better weekly.
  10. Virus definitions up to date.
  11. You have a Hardware firewall configure correctly.
  12. You have a software firewall configure correctly.
  13. Strong passwords 8-character Uppercase, Lowercase, i.e., 2h3ll017#! Or 2Jup1Ter17?
  14. Email Addresses are not visible on your website or social media as you will be targeted by Cyber Crime use a contact form on your websites.
  15. You have 2-3 different types of Backup.
  16. Encrypt your hard disks.
  17. The security flaws in systems in time there can be updates however we recommend not using systems prone to attack or some cases open source code or freeware.
  18. A weak password is: Hello123, hello1, companyname1066, password, these are easy passwords to crack.
  19. A strong password is jUp1ter1918! – this password is strong it has uppercase, lowercase, numbers, and special characters so that hackers cannot get into your email systems, one drive, Dropbox, Google Drive, iCloud, and SharePoint systems etc.
  20. Stronger password: #5454sesweYGYSD#!
  21. Test your password
  22. LastPass, KeePass are some examples of cloud base or local application which has encrypted master password were stored all your passwords safely and not one password for all logins or in a book or piece paper which could be lost or stolen.
  23. Recommend purchasing VPN – Virtual Private Network, Nord VPN is one of our personal favorites because of its vast VPNs, speed, and value for money. Surf Internet without broadcast your Public Internet Address.
  24. Recommend purchasing support on software and regular updates for local install software like Sage 50, Microsoft Office Suite, Adobe to name a few.

We advise not to advertise your email address in plain text on your websites, check a trade, yell, Facebook etc. As bots can scan these plain text email and start to make attempts to break your systems. It is better to have a contact form or your telephone number on the world wide web.
The next stage would be to introduce Multi-factor authentication (MFA) or Two-factor authentication (2FA) or Two-step verification. For some of these methods, you will need an IT expert setup.
Multi-factor authentication is a method of confirming a user's claimed identity in which a computer user is granted access only after successfully presenting two or more pieces of evidence to an authentication mechanism: knowledge, possession, and inference.


Excellent service guaranteed, read our reviews.