Cloud Backup
 

We`re just sending through your details

Please give us a few moments whilst we get your account ready.

OKAY

Bettys Tea Room Suffers Data Breach

Bettys Tea Room Suffers Data Breach

posted in Disaster Recovery ● 27 May 2015

Endpoint protection is likely to be on the minds of the managers at Bettys Tea Room in Harrogate after over 100,000 of its online customers had their personal details hacked, including telephone numbers, encrypted passwords, postal and email addresses, and names.

According to the Harrogate Advertiser, the company has stressed the fact that debit and credit card details have not been accessed because such information is stored on a third party system, but they are now urging their customers to make sure their passwords are changed on the site as soon as they can – and do the same for any sites where the same password was used.

“Whilst customer passwords were encrypted, there is a risk that they could still be vulnerable so we’re contacting all customers with details of the situation and advice regarding password protection. It’s a completely unprecedented event for us and we’re extremely sorry that the breach has occurred,” a spokesperson was quoted as saying.

It’s vital that you make sure you use strong passwords when conducting yourself online. If your passwords are weak, those intent on committing fraud or other crimes could access your bank account, purchase products using your money, send emails in your name, impersonate you on social media and also access any private information you have on your PC.

When choosing passwords, always opt for something with at least eight characters, using a combination of numbers, symbols and upper case and lower case letters. Don’t use associated words and avoid using your username, family birthdays, numerical sequences or pets’ names.

How third-party backup for OneNote and Class Notebooks avoids falling into non-compliance trap

If you use OneNote and Class Notebooks regularly, the prospect of waking up one day and finding that your notes have gone, is the stuff of nightmares.

Continue reading

5 ways to add real value to customers’ digital transformation initiatives by providing Kubernetes backup

Here we outline the five key elements CSPs and Azure consultancies need from a Kubernetes backup solution to add real value to customers’ digital transformation initiatives.

Continue reading

Microsoft 365 Security – An overview of best practices

The rise in home working, increase in laptops and wide-scale adoption of OneDrive, SharePoint , and OneNote has only served to intensify issues around data security and access.

Continue reading