Less than 700 days for Windows 7

As with every Windows Operating System before it, Windows 7 will soon no longer be supported by Microsoft. The official date for end of support is 14th January 2020, along with Server 2008 (R2) and Exchange 2010. The system is still widely used by organisations across the globe of all sizes and industries. However as […]

Google Docs Phishing E-Mail

A rather sophisticated phishing scam has been doing the rounds at Google Docs. Once the link is opened and access is granted to your account the message then sends out to all of your contacts which helped it spread quickly around the world. Google have apparently closed the accounts sending the original messages and are […]

What is Ransomware & Extortionware?

A New Criminal Business Model We all know that a computer virus is bad and that we need anti-virus software to protect our computers against them. Unfortunately, this is no longer enough. Cyber Security has become a lot more complicated since the turn of the century and even more so in the last few years. […]

Are you concerned about ransomware?

If not, maybe you should be. According to Kaspersky Lab, the number of users affected by file encrypting ransomware rose from 131,000 in 2014-2015 to 718,000 in 2015-2016! Extorting money from individuals and organisations has become a big business and unfortunately signature based PC Anti-Virus software just isn’t able to keep up. Imagine that all […]

Why data backup is no longer enough for the modern business

Backups are not important until they’re really important! The most overlooked and under-valued part of every IT infrastructure is backup. A good backup solution can cost a lot and while everything is running fine, a lot of companies don’t want to invest in something they don’t think they’ll use. That is until they need to […]

The New Crimeware Mafia Wants You to Get ‘Locky’

Like in a Francis Ford Coppola film, three major crimeware families are at the forefront of technological crime. Like the mafia, the families shake down their victims for ransom money, operate through a sinister black market, and pose a threat to businesses worldwide. They are the ransomware families: CryptoWall, CryptoLocker and TorrentLocker. Now, a new […]

What SMEs Need to Know About the IoT

LSA’s Mike Hickson has been talking to ExchangeWire about the Internet of Things (IoT) and how it affects SMEs. As the Director of a security systems provider Mike makes sure to point out the security risks brought from the IoT and its continuing growth into businesses. It is no longer enough to secure your network […]

7 Ways to Increase Your Company’s Cybersecurity

High-profile information security breaches are seemingly becoming weekly news—not least the recent TalkTalk hack, where more than 20,000 customer bank account numbers and sort codes, plus 1.2 million customer email addresses and phone numbers, were stolen. In the wake of this, Vodafone announced last week that the personal details of almost 2,000 customers may have […]

Security Breaches occur no matter how big or small your business

TalkTalk and now Vodafone are among the latest high profile organisations to suffer from a cyber- security breach or ‘hack’. However just because you run a small business don’t believe that you are safe from the cyber criminals. According to research published by the Department for Business Innovation & Skills (BIS) 38% of small businesses […]

LSA Systems has Launched into the Future

As an established IT company, at LSA Systems, there’s nothing we value more than the power of technology and its ability to carry us forward to a brighter future. That’s why we take such great pleasure in announcing the launch of the brand new LSA Systems website, developed using the latest web-building techniques and technology. […]

Microsoft releases urgent patch

All supported versions of Microsoft Windows now need to be urgently patched to fix a remote code-execution vulnerability. This latest serious security flaw (MS15-078) lies within the Windows Adobe Type Manager Library. It can be exploited by attackers to hack into vulnerable PCs and infect them with malware. A user who opens a document or […]

Hackers Return to “Old School” methods

Following a spate of email based phishing exercises to gain your bank information, it appears that a trend to revert to “old school” methods has arisen: The hacker will through whatever means are available, steal your customer data and a copy of your company letterhead. They will then write to every customer using the words […]

Using cloud-based accounting software to manage business finance

There are many benefits to using cloud based accounting software, however as with most things in life, along with benefits come potential pitfalls. This document is intended to highlight what, in my opinion, are the main advantages, and to detail the potential dis-advantages so that the reader is in possession of all the facts and […]

Ransomware – The new malware on the block

Ransomware, malicious programs that lock a computer and uses police enforcement logos and terminology to intimidate victims has spread from Eastern Europe to Western Europe, the United States, and Canada over the past year. The scam has been professionalised from initial early attacks, with established criminal gangs now branching out into using it. Each gang […]