Skip to content
G5 Technologies

G5 Technologies

Your Business IT Partner

Menu

  • Home
  • Cyber Security
    • Microsoft 365 Security
    • External Network Security Assessment
  • IT Support
    • IT Support Aberdeen
    • Connectivity
    • Cloud Solutions
    • IT Security
    • Wi-Fi – G5Zone™
  • Blog
    • Newsletter Sign-up
    • Blog Archive
  • About Us
    • Testimonials
  • Contact
  • Resources
    • Business Owners Guide to Email Security
    • Cyber Hygiene
    • Educational Guides
    • Has my email address been compromised?
    • How to become a hacker
    • How To Videos
    • Password Strength Test
    • Recommended Technology Platform
    • Switching IT Providers
    • Tech Tuesday Videos
  • Remote Support

Cybersecurity

What’s Changing in the Cybersecurity Insurance Market?

Free A Paper beside a Person Typing on a Laptop Stock Photo

Cybersecurity insurance is still a pretty new concept for many SMBs. It was initially introduced in the 1990s to provide coverage for large enterprises. It covered things like data processing errors and online media. Since that time, the policies for

G5 Technologies 31st January 20231st December 2022 Cybersecurity Read more

What Cybersecurity Attack Trends Should You Watch Out for in 2023?

Free photos of Cyber

The new year has just begun and it’s a time of renewal as we plan for the possibilities to come in 2023. It’s also a time when you need to plan for resiliency in the face of ever-present cyberattacks. Sixty-eight

G5 Technologies 25th January 20231st December 2022 Cybersecurity Read more

Don’t Set Yourself Up to Fail: Tips for Safer Home Security Setups

gold Apple iPhone smartphone held at the door

The global home security market has been growing by leaps and bounds. By 2026, experts expect the market to expand at a rate of 20.1%. This is on top of an expected increase of 21.6% from 2021 to 2022. From

G5 Technologies 20th January 20231st December 2022 Cybersecurity Read more

5 Ways to Balance User Productivity with Solid Authentication Protocols

Free photos of Cyber security

One constant struggle in offices is the balance between productivity and security. If you give users too much freedom in your network, risk increases. But add too many security gates, and productivity can dwindle. It’s a fine balance between the

G5 Technologies 5th January 20231st December 2022 Cybersecurity, Productivity Read more

What to Include in a Year-end Technology Infrastructure Review

Free illustrations of Checklist

When the year is coming to a close, it’s the perfect time to plan for the future. Most businesses begin the year with the hope of growing and improving operations. Much of how a business operates depends on technology. So,

G5 Technologies 31st December 20223rd November 2022 Cybersecurity, IT Management Read more

What Are the Advantages of Implementing Conditional Access?

Free illustrations of Neon

It seems that nearly as long as passwords have been around, they’ve been a major source of security concern. Eighty-one percent of security incidents happen due to stolen or weak passwords. Additionally, employees continue to neglect the basics of good

G5 Technologies 25th December 20223rd November 2022 Cybersecurity Read more

Tips for Overcoming Barriers to a Smooth BYOD Program

Free A Person Working on His Laptop Stock Photo

Bring your own device (BYOD) is a concept that took hold after the invention of the smartphone. When phones got smarter, software developers began creating apps for those phones. Over time, mobile device use has overtaken desktop use at work.

G5 Technologies 20th December 20223rd November 2022 Cybersecurity, IT Management Read more

Simple Guide to Follow for Better Endpoint Protection

Free photos of Ransomware

Endpoints make up much of a company’s network and IT infrastructure. This is a collection of computers, mobile devices, servers, and smart gadgets. As well as other IoT devices that all connect to the company network. The number of endpoints

G5 Technologies 25th November 20225th October 2022 Cybersecurity Read more

Insider Threats Are Getting More Dangerous! Here’s How to Stop Them

red padlock on black computer keyboard

One of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection.

G5 Technologies 20th November 20225th October 2022 Cybersecurity Read more

Checklist for Better Digital Offboarding of Employees

Free photos of Checklist

Digital footprints cover today’s modern workplace. Employees begin making these the moment they’re hired. They get a company email address and application logins. They may even update their LinkedIn page to connect to your company. When an employee leaves a

G5 Technologies 10th November 20225th October 2022 Cybersecurity, IT Management Read more

9 Urgent Security Tips for Online Holiday Shopping

Free Person Shopping Online Stock Photo

The holiday shopping season is taking off. This means that scammers have also revved up their engines. They’re primed and ready to take advantage of all those online transactions. Don’t forget to stay safe online during the buying frenzy that

G5 Technologies 5th November 20225th October 2022 Cybersecurity Read more

What Is Microsoft Defender for Individuals & What Does It Do?

Free Close Up of a Keyboard Stock Photo

When you hear about Microsoft adding security apps to M365, it’s often the business versions. But the pandemic has changed the way that we see the workplace. It’s now a hybrid world. One made up of several connected “mini-offices” located

G5 Technologies 25th October 20222nd September 2022 Cybersecurity, Microsoft Read more

The Biggest Vulnerabilities that Hackers are Feasting on Right Now

Free illustrations of Hacker

Software vulnerabilities are an unfortunate part of working with technology. A developer puts out a software release with millions of lines of code. Then, hackers look for loopholes that allow them to breach a system through that code. The developer

G5 Technologies 20th October 20222nd September 2022 Cybersecurity Read more

Small Businesses Are Attacked by Hackers 3x More than Larger Ones

person in black long sleeve shirt using macbook pro

Have you felt more secure from cyberattacks because you have a smaller business? Maybe you thought that you couldn’t possibly have anything that a hacker could want? Didn’t think they even knew about your small business. Well, a new report

G5 Technologies 15th October 20222nd September 2022 Cybersecurity Read more

Internet Explorer Has Lost All Support (What You Need to Know)

Free photos of Computer

After being the main entry to the internet in the late 1990s and early 2000s, Internet Explorer (IE) is gone. As of June 15, 2022, Microsoft dropped the web browser from support. IE ushered in the age of connection to

G5 Technologies 10th October 20222nd September 2022 Cybersecurity, Microsoft Read more

You Need to Watch Out for Reply-Chain Phishing Attacks

Free illustrations of Phishing

Phishing. It seems you can’t read an article on cybersecurity without it coming up. That’s because phishing is still the number one delivery vehicle for cyberattacks. A cybercriminal may want to steal employee login credentials. Or wish to launch a

G5 Technologies 30th September 20228th August 2022 Cybersecurity Read more

What Should You Do to Reduce Risk When Your Mobile Device Goes Missing?

Free illustrations of Cybersecurity

Few things invoke instant panic like a missing smartphone or laptop. These devices hold a good part of our lives. This includes files, personal financials, apps, passwords, pictures, videos, and so much more. The information they hold is more personal

G5 Technologies 25th September 20228th August 2022 Cybersecurity Read more

How Using the SLAM Method Can Improve Phishing Detection

Free vector graphics of Hack

There is a reason why phishing is usually at the top of the list for security awareness training. For the last decade or two, it has been the main delivery method for all types of attacks. Ransomware, credential theft, database

G5 Technologies 31st August 20224th July 2022 Cybersecurity Read more

Did You Just Receive a Text from Yourself? Learn What Smishing Scams to Expect

Free illustrations of Cyber

How many text messages from companies do you receive today as compared to about two years ago? If you’re like many people, it’s quite a few more. This is because retailers have begun bypassing bloated email inboxes. They are urging

G5 Technologies 25th August 20224th July 2022 Cybersecurity Read more

How Often Do You Need to Train Employees on Cybersecurity Awareness?

Free illustrations of Security

You’ve completed your annual phishing training. This includes teaching employees how to spot phishing emails. You’re feeling good about it. That is until about 5-6 months later. Your company suffers a costly ransomware infection due to a click on a

G5 Technologies 20th August 20224th July 2022 Cybersecurity Read more

Home Security: Why You Should Put IoT Devices on a Guest Wi-Fi Network

Free photos of Computer

The number of internet-connected devices in homes has been growing. It’s increased exponentially over the last decade. A typical home now has 10.37 devices connected to the internet. PCs and mobile devices make up a little over half of those

G5 Technologies 15th August 20224th July 2022 Cybersecurity Read more

Which Form of MFA Is the Most Secure? Which Is the Most Convenient?

Registration, Log In, Keyboard, Hand, Write

Credential theft is now at an all-time high and is responsible for more data breaches than any other type of attack. With data and business processes now largely cloud-based, a user’s password is the quickest and easiest way to conduct

G5 Technologies 31st July 20226th June 2022 Cybersecurity Read more

Top 5 Mobile Device Attacks You Need to Watch Out For

Displaying Top 5 Mobile Device Attacks You Need to Watch Out - raw image.jpg

Smartphones and tablets are often the preferred device for communications, web searching, and accessing many types of apps. They’re more portable and can be used from anywhere. We’re seeing the takeover of many activities that used to be performed on

G5 Technologies 25th July 20226th June 2022 Cybersecurity Read more

Signs That Your Computer May Be Infected with Malware

Hacker, Hack, Anonymous, Hacking, Cyber, Security

Approximately 34% of businesses take a week or longer to regain access to their data and systems once hit with a malware attack. Malware is an umbrella term that encompasses many different types of malicious code. It can include: Viruses

G5 Technologies 20th July 20226th June 2022 Cybersecurity Read more

What You Need to Know About the Rise in Supply Chain Cyberattacks

Cyber, Attack, Encryption, Smartphone, Mobile, Finger

Any cyberattack is dangerous, but the particularly devastating ones are those on supply chain companies. These can be any supplier – digital or non-digital – of goods and services. We’ve seen several attacks on the supply chain occur in 2021

G5 Technologies 30th June 20223rd May 2022 Cybersecurity Read more

How to Protect Your Online Accounts from Being Breached

Cyber Security, Technology, Network, Internet

Stolen login credentials are a hot commodity on the Dark Web. There’s a price for every type of account from online banking to social media. For example, hacked social media accounts will go for between $30 to $80 each. The

G5 Technologies 15th June 202214th June 2022 Cybersecurity Read more

6 Ways to Combat Social Phishing Attacks

Phishing, Credentials, Data, Login, Password, Internet

Phishing is the number one method of attack delivery for everything from ransomware to credential theft. We are very aware of it coming by email, but other types of phishing have been growing rapidly. In recent years, phishing over social

G5 Technologies 10th June 20223rd May 2022 Cybersecurity Read more

5 Things You Should Never Do on a Work Computer

person using laptop

Whether you work remotely or in an office, the line between personal and work tasks can become blurred when working on your company computer. If you’re in front of a computer for most of your time during work, then it’s

G5 Technologies 31st May 20225th April 2022 Cybersecurity Read more

Alarming Phishing Attack Trends to Beware of in 2022

Hacking, Data Theft, Online Fraud, Cyber Crime, Hacker

In 2020, 75% of companies around the world experienced a phishing attack. Phishing remains one of the biggest dangers to your business’s health and wellbeing because it’s the main delivery method for all types of cyberattacks. One phishing email can

G5 Technologies 25th May 20225th April 2022 Cybersecurity Read more

Important Steps to Take Before You Recycle a Mobile Phone Number 

From above view of faceless person holding mobile phone with white screen and green recycle logo above marble surface

It’s not unusual to change a mobile number from time to time. For example, when you move, you may want a number that is local to the area you just moved to. Companies also may end up recycling mobile numbers

G5 Technologies 20th May 20225th April 2022 Cybersecurity Read more

Top 5 Cybersecurity Mistakes That Leave Your Data at Risk

Computer, Circuit Board, Cpu, Security, Digital

The global damage of cybercrime has risen to an average of $11 million USD per minute, which is a cost of $190,000 each second. 60% of small and mid-sized companies that have a data breach end up closing their doors

G5 Technologies 10th May 20225th April 2022 Cybersecurity Read more

Making Your VoIP Network Bulletproof (Six Tips to Protect Your VoIP from Cyberattacks)

man in gray crew neck long sleeve shirt holding black smartphone

Hardly any phone call system in a business beats VoIP when it comes to efficiency and flexibility. However, it’s not immune to cyberattacks. Discover how you can secure your VoIP ASAP. What kind of communication system are you using for

G5 Technologies 25th April 202229th March 2022 Cybersecurity Read more

Why Protecting Your Printers from Cybercrime Is a Must (And 8 Tips for Improving Printer Security)

Print, Digital, Printing, Scan, Office, Technology

Printing devices are often overlooked when it comes to security. But the reality is, cybercriminals can hack your printer to get confidential information. Your printer is probably the last piece of computer equipment you thought needed protection from cybercriminals.  But

G5 Technologies 5th April 202229th March 2022 Cybersecurity Read more

G5 Technologies

5 Abercrombie Court
Arnhall Business Park
Prospect Road
Westhill
Aberdeenshire
AB32 6FE

01224 443 896

info@g5tech.com

Registered No: SC 270539.
VAT number: 847 9379 61.

Connect with us

Subscribe to our newsletter

Visit the newsletter archive

  • Twitter
  • Facebook
  • LinkedIn

IT Solutions

  • IT Support Aberdeen
  • Dundee-IT-Support
  • Connectivity
  • Cloud Solutions
  • IT Security
  • WiFi

Latest News

  • What’s Changing in the Cybersecurity Insurance Market? 31st January 2023
  • What Cybersecurity Attack Trends Should You Watch Out for in 2023? 25th January 2023
  • Don’t Set Yourself Up to Fail: Tips for Safer Home Security Setups 20th January 2023
Copyright © 2023 G5 Technologies. All rights reserved. Theme Spacious by ThemeGrill. Powered by: WordPress.
  • Privacy Policy
  • Quality Policy
  • Vacancies

We would like to use cookies to give you the best experience on our website.

If you would like to find out more about which cookies we would like to use then click here: settings.

Please click accept if you are happy for us to use cookies.

G5 Technologies
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.

Google Analytics

This website uses Google Analytics which collect anonymous information such as the number of visitors to the site, and the most popular pages. It records Internet Protocol (IP) address in order to do this but we have it set up so that these IP addresses are masked.

Keeping this cookie enabled helps us to improve our website.

 

Please enable Strictly Necessary Cookies first so that we can save your preferences!

Privacy Policy

More information about our Privacy_Policy