See the latest updates from One2Call
Whether it is our latest Newsletter, Case Studies, the latest updates in the Cyber Security world, or just some Tech Tips for you and your business. We have you covered.
Check back regularly for the latest news.
What's the latest news in the world of Tech?
We have so much news that we want to tell our customers (and prospective customers) that we can’t include everything in our monthly emails. This is why we have created our News page, here we can share regular newsletters that we already share with Sheffield & Doncaster Chamber Members, latest updates (and breaches) in the Cyber Security world, and also Tech Tips that can help your business and your employees.
Popular YouTube Channel ‘Linus Tech Tips’ Suffers Hack
Linus Tech Tips, along with two other Linus Media Group YouTube channels, have been reinstated following a major breach that enabled a malicious actor to carry out activities such as streaming fraudulent crypto videos, modifying channel names, and erasing videos....
Trusted Essential Cyber Insurance for Small Businesses with Managed Service Providers
Did you know about half of all cyber attacks target small to medium sized businesses, with 60% of small business victims closing within six months of an attack. One2Call are an essential ally for small businesses seeking the tools required to gain the right cyber...
How Endpoint Detection & Response (EDR/MDR/XDR) can benefit your business
There is a growing concern in the level of email security for businesses of all sizes as cyber threats become more sophisticated and frequent. Email remains one of the most highly leveraged attack vectors for threat actors, with phishing, business email compromise...
Mitigating Ransomware Attacks with Multi-Factor Authentication (MFA)
Ransomware attacks have increased 150% since the pandemic. But what is Ransomware and how could an attack effect your business? Simply, ransomware attacks can be initiated through various tactics, including email phishing, brute force attacks, and stolen passwords...
The Best Practices for Improving Mobile Device Security on Your Network
Require Screen Lock Enabling a strong password authenticated screen lock is a widely recognised best practice for securing mobile devices, whether they are corporate or personal. Despite this, we continue to observe a significant number of people and businesses...
How ITDR can help protect you from the latest Cyber Security Threats
Attacks targeting the identity layer have become a prominent cyber security threat, as attackers adapt to the consolidated corporate IT world of Access Management. Duo's algorithm research team aligns with Gartner's Identity Threat Detection and Response (ITDR) to...
Protect yourself from Stealthy Cyber Attacks
State-sponsored hackers from China have developed sophisticated techniques that allow them to infiltrate government and business networks and spy on victims for long periods without being detected by common cybersecurity tools, according to researchers at Google's...
Charities are being targeted with Phishing and Ransomware Attacks
A recent threat report released in January 2023 highlights the susceptibility of the charity sector to cyber attacks, the tactics employed by cyber criminals, and the optimal strategies for charities to safeguard themselves. The ramifications of cyber attacks on...
TikTok Banned on Government Devices amid Security Concerns
Today the UK Government has announced that, on security grounds, the Chinese-owned social media app TikTok will be banned on devices utilised by civil servants and government ministers, taking immediate action. Cabinet Office Minister, Oliver Dowden, released a...
The Problems with Passwords, Transitioning to Passwordless Logons
Single password-based authentication has become outdated in the digital era due to powerful machines becoming more efficient at cracking (or brute forcing) passwords, amplifying weakness made by users creating predictable passwords that are easy to guess. With...
Failing to Patch Vulnerabilities can lead you Open to Attack
Software vulnerabilities are weaknesses in computer programs that are exploited by cyber attackers to gain unauthorised access to systems. Attackers can take advantage of these vulnerabilities to run malicious codes, bypass security measures, and access sensitive...
OpenSSL releases update to address Vulnerabilities
The OpenSSL project has released version 3.0.7, a security update for two vulnerabilities in OpenSSL 3.0.x. These vulnerabilities, CVE-2022-3786 and CVE-2022-3602, affect version 3.0.x and do not impact OpenSSL 1.1.1 or LibreSSL. Organizations are urged to ensure that...
Our Customers
Testimonials
Mark Hamilton, Gooding Group
Good communicative engineer worked away discreetly and kept me informed of progress.
Jane, Barca Leeds
Very quick at responding to problems – keep you updated – easy to deal with – very happy with the service !
Pete Richardson, DALP
Always provide very prompt support. Excellent.