Blog

New banking threat to Android Phones – Why “Free” might cost you

New banking threat to Android Phones – Why “Free” might cost you

The Cybereason Nocturnus team is has uncovered a new type of Android mobile malware that emerged around March 2020. EventBot is a mobile banking trojan that uses Android’s accessibility feature to steal user data from financial applications and steal SMS messages to allow the malware to bypass

Read more

Remote Working leads to New Cybersecurity Threats

Remote Working leads to New Cybersecurity Threats

As workers and businesses get more familiar with remote working, new threats are continuing to make headlines. The UK’s National Cyber Security Centre announced a joint alert with the United States’ Cybersecurity and Infrastructure Security Agency regarding the rise in cyber attacks related to the COVID19 crisis

Read more

Cloud adoption – The myths busted and the facts revealed

Cloud adoption - The myths busted and the facts revealed

For those who don’t know what the cloud is, it’s simple – it’s just someone else’s computer system, housed in a datacentre or datacentres – and you connect to it via an internet connection, in theory from anywhere. Here are my top 7 myth-busting facts as to

Read more

Security Policies for the Enterprise

Security Policies for the Enterprise

Potted history and context Not too long ago (in my mind), in the 1980s, the software revolution was in full swing. The Personal Computer had been invented and the Enterprise was discovering the benefits of in-house software to perform number crunching and share information rapidly. It seemed

Read more

Same great service – now ‘award-winning’

Same great service - now 'award-winning'

For 30 years, TTG, formerly known as SCA Group, has been at the forefront of helping small and medium sized businesses across London and the south east to grow by providing the right products, services and support. We’re thrilled that recently that was recognised. We’ve been named

Read more

Internet Security: The 3 Rules for Creating Strong Passwords

Internet Security:  The 3 Rules for Creating Strong Passwords

There are lots of different ways in which individuals and organisations can render themselves vulnerable to cyber-attacks and defending yourself effectively at all times against a full array of online nasties is not always easy.  It is more important than ever to be vigilant with your internet

Read more

How to handle the human side of IT change management

How to handle the human side of IT change management

IT leaders probably know better than anyone that when a business undergoes changes big or small it can be met with resistance from the workforce. As human beings we are often uncomfortable with change, we fear it, we’re sceptical about it and we worry about how it’s

Read more