
Don't be caught out by a phishing attack
by Jacqui Bell | April 26, 2021
What is phishing? In a phishing attack, a cyber criminal seeks to trick victims into revealing sensitive information such as their name and address, their bank account or payment card details, and their user name and password for online accounts. This may all start with a fraudulent email, where the cyber criminal pretends to be someone that you know or trust such as your bank, your wo...
User and admin accounts - control access to your computer
by Jacqui Bell | April 13, 2021
What are you able to do on your computer? What can anyone else do - either sitting in front of it, or remotely? Types of account Each time a new person logs on to a computer or other device (whether that device is new or not) and creates a new user account or has an account created for them, the type of account determines what that user is able to do. Administrator...
What and where is the Cloud?
by Jacqui Bell | March 17, 2021
In this latest article on internet and data security, we explain more on where and how your data is stored - and crucially, what you can do to maximise its safety.What is the Cloud? The cloud is used as a term for a series of on demand, remote access, subscription services that exist on the internet. One commonly used cloud service is data storage. Instead of storing in...
Ninja at the Gateway - the Secrets of your Router
by Jacqui Bell | March 08, 2021
Throughout history, when building homes, villages and towns, people have sought to create a layer of defence or security to maintain their safety and keep the bad guys out. Means of doing this have included locating oneself on a high hill, building boundary walls, moats, strong front doors and deploying armed guards and dogs. In the cyber world, rather than your material possessions, th...
Wise up to strong passwords
by Jacqui Bell | February 22, 2021
Why are passwords so important? When going about your day, there seems to constantly be a service asking for a password: it feels as if you need one just to change your mind these days. how many passwords do you think you have?how do you remember them all?or do you just use the same one over and over?Just think for a minute of your front door ...
Keep your wits about you while shopping online
by Jacqui Bell | January 29, 2021
This week, in conjunction with the IASME Consortium, we're asking you to think about your security while making online purchases. With more of us online more than ever as a result of the global Covid-19 pandemic, whether socialising over Zoom or shopping, we must always be mindful to keep our details secure. Do...
Why you need to know about cyber-crime
by Jacqui Bell | January 15, 2021
The crimes that are being perpetrated are not new: they are crimes as old as time, it's still fraud, theft, espionage, stalking etc. As our Chief Information Security Officer, Jo Austin, explains, what has changed is the tools criminals now have at their disposal have allowed them to become anonymous and given them greater access to you, your possessions and information. In the pas...
Cyber Essentials with Clumber Consultancy - Boundary Firewalls and Gateways
by Darren Toms | June 05, 2020
You may recall that back in 2019, Clumber Consultancy became the first in our sector to achieve the Government's Cyber Essentials Plus and IASME Audited Gold Awards. Now, with a new partnership announced between the National Cyber Security Centre (NCSC) and the IASME Consortium to relaunch the 'Cyber Essentials' Scheme, Clumber's Data Security specialist Jo Austin looks at each of the 5 ...
The Cyber Essentials for your business - a quick guide
by Darren Toms | May 01, 2020
Earlier this month, a new partnership was announced between the National Cyber Security Centre (NCSC) and the IASME Consortium to relaunch the 'Cyber Essentials' Scheme. You may recall that back in 2019, ...