Number matching MFA is changing authentication as we know it

Are you relying on traditional multi-factor authentication (MFA) to keep your company’s data safe? You may want to rethink that strategy. Microsoft recently announced that from February 27, 2023, number-matching MFA will be the default setting for its mobile app – a key step in its efforts to stay one step ahead of cybercriminals. In this blog, we take a look at this change and the importance of authentication & security for businesses.

Read More
EKCO Marketing
Virtual IT Director (vCIO)

In practice, many IT Managed Services Providers (MSPs) today, will include a virtual IT Director/vCIO as a valuable element of their support provision and at no added cost to you, the client.

This helps them to provide a complete, end-to-end service, ensuring expert management and maintenance of your entire IT infrastructure.

In many cases, the vCIO service will be fully supported by advanced back office systems and delivered through regular Account Management meetings, virtually or in person.

Read More
ITForce Squarespace
How to Identify a “Smishing” Attempt on Your Smartphone

Have you been receiving texts from political candidates, manufacturers, insurance companies, fundraising campaigns, or any other strange messages? If so, you’re probably scratching your head wondering how they got your phone number because you know for a fact that you have never sent them texts before. There’s a simple explanation for those unexplained texts. It’s called “smishing”, and it has become extremely common. Not only is it annoying, but worse, it can be troubling.

Read More
ITForce Squarespace
How to secure your business smartphone in 5 minutes

How much company data do you store on your smartphone? How much company data do your employees store on their smartphones?

When it comes to mobile device security, it's usually an afterthought. However more company data and business are now being done on mobile devices than ever before.

You'll learn in the next 5 minutes some of the easiest things you can do to secure your company smartphones.

Read More
ITForce Squarespace
47% Of All Hacked Websites Contained At Least One Backdoor

Most cybercriminals attempting to hack websites simply play a numbers game, using automated scripts to discover weaknesses almost effortlessly. Once they are successful, hackers can use a website they have gained control over to infect readers’ computers with malware, gain access to sensitive data, launch DDoS attacks, or set up malicious redirects to questionable websites.

Read More
ITForce Squarespace