Keep up-to-date with the latest IT news, technology trends and IT support advice from the Westlake team.
What is spam, phishing and spoofing? E-mail spoofing is often an attempt to trick the user into making a damaging statement or releasing sensitive information, such as a password. Spam and phishing emails typically use spoofing to mislead the recipient about the origin of the message. Phishing is the attempt to obtain sensitive information such...Read more
What does GDPR say? There are no specific requirements under GDPR regarding passwords in terms of minimum length, capital letters, numbers, maximum periods of validity or required change frequency. However, you do have to demonstrate that you have data access procedures in place. We advise that all our clients have a password policy as part...Read more
It’s the daily discussion in the workplace, especially if systems appear sluggish, or access to servers is denied but...Read more
If so, you’re not alone, 70% of us feel that our meetings with clients and/or colleagues did not result in clear outcomes...Read more