Infographic: The pitfalls of failing to update computer systems

Outdated computer systems are vulnerable to a variety of attacks online. The problem is that hackers continuously look for new vulnerabilities to exploit, so once support is ended for a system (in other words, once a system is no longer being updated to counter new security threats), it’s usually only a matter of time until an attack gets through. This is particularly problematic in the charity sector, where organisations might hold sensitive information and often don’t have the budget to upgrade their IT equipment. It’s because of this that we’re happy to offer the latest Windows operating systems and also award-winning antivirus software to UK charities on the…
Read More

How to deal with leavers in Office 365

When someone leaves your organisation, it’s important to make sure that you secure any confidential files and data. Thankfully, if you use Office 365, you have a good level of control to manage this process. There are a variety of options available to you, allowing you to completely remove access from mobile devices, delete accounts, or move accounts to replacement employees. To find out how to do all of this, scroll through the resources below or click the links to visit specific sections. Note: All of the below assumes that your Office 365 account has ‘global administrator’ permission. I will be…
Read More

Why charities resist the cloud and why they shouldn’t

The growth of the use of cloud technology in business is nothing short of phenomenal. The reason for this is that it saves on time, cost and enables flexible working. Despite these benefits, I find that many charities are still resisting its adoption. At Tech Trust, we recently undertook a survey of 426 respondents and found that 58% of charities still don’t use the cloud – 65% of which are small charities. With the array of articles written about the benefits of the cloud, including this recent article from our own IT expert Andy Man, I wanted to know why, and…
Read More

Guarding your charity’s data: a word about firewalls

Most people nowadays will have heard of a firewall, and the majority of those will know that it has something to do with data security. But if asked what it is that a firewall actually does or how it differs from an antivirus, people are generally a lot less sure. This is understandable – as opposed to antivirus software, where the clue is in the name, a firewall is a more ambiguous term. To help you understand exactly what your firewall does and why you need one, I’ll run you through some of the basics about firewalls and advise you…
Read More

A charitable approach to Bring Your Own Device

For many in the charity sector, Bring Your Own Device (BYOD) is an inevitable reality. Limited budgets mean that charities often struggle to regularly refresh their hardware; while at the same time, employees and volunteers are generally willing to use their own kit. These factors usually mean that banning BYOD is not a viable option for charities, which can leave them open and vulnerable to IT security risks. I know how helpful tablets can be in meetings and for working on the go, but I also know that the average charity can’t afford to provide all of their staff with…
Read More

Mastering the art of the password

Since the Heartbleed data breach, there have been an army of security and IT professionals telling us to change our passwords and usernames for all of our online accounts. The reason for this is simple – when one website’s security is compromised, it is surprisingly easy to access other accounts from different websites. This is mainly down to a lack of variation in our passwords and usernames. Most of us are guilty of using the same password and username combinations for numerous accounts because it’s easier; using different security information for each account just makes it harder to remember which…
Read More