Two thirds of remote workers use a faulty device so they don’t get into trouble

A new report has discovered that 67% of remote workers are using faulty tech when they work remotely and often that’s because they’ve accidentally damaged the tech themselves… they don’t want to admit it to their boss in case they get into trouble.

A company that sells refurbished technology surveyed 2,500 UK employees.

It found that laptops were most likely to be broken, followed by keyboards, monitors and PCs.

Most of the time the damage was done by spilled food and drink. Other causes of damage included other people in the house – such as a partner or housemates – and of course, pets.

We’ve all watched in horror as a cat brushes itself against a full glass of water next to a laptop…

While more than half of people try to fix the damage, and 81% of people continue to use their faulty device with limited features, a third of workers switch to their personal devices instead.

As well as this causing a loss of productivity, it could also be a huge data security risk for your business.

Because it’s possible their personal laptop doesn’t have as much security protection as their work laptop does, such as:

 

  • Security software
  • Data encryption
  • Enhanced password protection such as multi-factor authentication

 

Their personal devices also aren’t being monitored by your IT support partner.

When an attacker gains access to an unmanaged device, if it’s connected to your network, it’s possible they can get access to the wider network, and all of your business’s data.

This can result in your data being stolen and sold. Or worse, your data being encrypted so it’s useless to you – and you must pay for its return. This is called a ransomware attack and it’s the greatest cyber security threat to your business right now.

It’s not just access to your data that’s the problem. After a ransomware attack, there is a huge time and financial cost involved in making sure your network is clean, protected and secured.

Our advice is to make sure that everyone in your business understands the risks involved with using personal devices for work purposes, whether they work remotely or not.

 

You might want to make a golden rule that all work must only be done on business devices.

 

You could also create a culture where it’s OK if a device gets damaged, so long as it’s reported quickly.

 

If you need any help choosing the right technology or cyber security approach for your team, or creating new policies to help your staff choose to do the right thing, give us a call.

 

 

Published with permission from Your Tech Updates.

Are Hackers Targeting Your Business for Data or Monetary Theft?

As the MD of a small business, you are under attack from hackers. Right now, extremely dangerous and well-funded cybercrime rings in China, Russia and the Ukraine are using sophisticated software systems to hack into thousands of small businesses like yours. All they want is to steal credit cards and client information, and swindle money directly out of your bank account. Take the recent Foxtons attack that made the the news, just one of many examples that are happening on a scary, frequent basis. Some are even being funded by their own government to attack UK businesses.

Too small for a Cyberattack?

Don’t think you’re in danger because you’re small and not a big target like a TalkTalk or Boots? Think again. 82,000 NEW malware threats are released every single day and HALF of the cyber-attacks occurring are aimed at small businesses. You just don’t hear about it because it’s kept quiet for fear of attracting bad PR, lawsuits, data-breach fines and out of sheer embarrassment.

In fact, the insurance company Hiscox reports that 65,000 SMEs are attacked every day, with 4,500 successful breaches, And that number is growing rapidly as more businesses utilize cloud computing and mobile devices, and store more information online. Quite simply, most SMEs are low-hanging fruit to hackers due to their lack of adequate security systems – which is what prompted this urgent post to all of you.

antivirus, computer, security, malware, phishing, cyber security, training

What to do right now

There are a few simple things you need to be doing on a consistent basis to avoid being the next statistic. They are:

  • Use a strong password. I know, simple, right? But so many people are still using easy-to-guess passwords like “password” or other words or phrases. Guess what: hackers have sophisticated software programs that can try to log in to your PC, account, web site, etc., at the rate of 8 million login attempts per SECOND. If your password is easy, they’re in. Your password should contain at least 8 characters, uppercase and lowercase letters, a number and a symbol (! or #, for example).
  • Use a secure password manager or Two Factor Authentication system to make it harder for the hackers to breakthrough.
  • Employees clicking on phishing e-mails or downloading virus-laden files is still the #1 way hackers gain access to and control of business networks. Therefore, you need to provide an Acceptable Use Policy (AUP) that details what employees can and cannot do with company-owned devices, files, software, etc. Even better you can implement a Managed Security Policy that prevents non-business PC use in the first place.
  • Educate your employees! It’s vital that you and your employees can spot threats. You need to make them aware of how to spot a phishing e-mail or attack so they can avoid it altogether with effective Cyber Security Awareness Training.

Speak to our IT consultants to find out more about our IT security options for SMEs. Call us on 0203 005 9650 now.

 

 

Zerologon bug is most severe experienced by Microsoft

News has emerged that Microsoft patched a startlingly severe bug called Zerologon that affected Windows Servers. Dutch security company Secura B.V. released a blog post detailing how the bug works by taking over the Netlogon authentication process on Windows Servers and effectively gives hackers admin rights to the network and allows them to:

• impersonate the identity of any computer on a network when trying to authenticate against the domain controller
• disable security features in the Netlogon authentication process
• change a computer’s password on the domain controller’s Active Directory (a database of all computers joined to a domain, and their passwords)

The bug was named Zerologon, as the attack is achieved by adding zero characters in certain Netlogon authentication parameters.

The attack cannot happen outside a network as the hacker must already be in the network to launch the attack, but it’s claimed once inside, the attacker can take over an entire corporate network in just three seconds.
“This attack has a huge impact,” the Secura team said. “It basically allows any attacker on the local network (such as a malicious insider or someone who simply plugged in a device to an on-premise network port) to completely compromise the Windows domain.”

The bug has been given a 10/10 severity rating and is also a boon for malware and ransomware hackers, who often rely on infecting one computer inside a company’s network and then spreading to multiple others. With Zerologon, this task has been considerably simplified.

While Microsoft released the patch last month, it’s said requires a further install to fully resolve the problem which will be available in February 2021.

Globalnet updates all our clients with Microsoft and software patches automatically, as they are released. In Microsoft’s case, this is every week during what is known as Patch Tuesday. We have run exhaustive tests across all the networks we manage and can reassure our clients that they are currently up to date and safe from any attack via Zerologon.

UK Cyber threats up 37%

Online threats have risen by as much as six-times their usual levels over the past four weeks as the COVID-19 pandemic provides new ballast for cyber-attacks, according to Cloudflare. The web security and content delivery vendor analyzed UK traffic figures for the past four weeks compared to the previous month and noted a sharp uptick in malicious activity.

It revealed that hacking and phishing attempts were up 37% month-on-month, while on some days, the firm was blocking between four- and six-times the number of attacks it would usually see. The firm said the uptick was the result of “recreational” hackers with more time on their hands. However, professional cyber-criminals are also using the global incident to further their own agendas. Phishing attempts have soared by over 600% since the end of February, including traditional impersonation scams but also business email compromise (BEC) and extortion attacks, according to Barracuda Networks.

In Hong Kong, likely state-sponsored attackers are even using the virus as a lure to trick users into clicking on news links booby-trapped with iOS spyware. Domain registrars are ramping up efforts to halt automatic registration of any website names that are linked to COVID-19, for fear they may be phishing sites or those selling counterfeit goods like surgical masks and pharmaceuticals.

Interpol announced last week that it had already managed to seize $14m worth of such fake goods. Even the National Cyber Security Centre (NCSC) has been stepping in to remove malicious and phishing sites.

Aside from the rise in threat levels, Cloudflare also noted an overall uptick in internet use of 17%, as the majority of the country is urged to stay indoors and work from home. Online visits to tutoring sites grew most during the past four weeks, up 400%, while website numbers in categories such as politics (320%), TV (210%) and gardening (200%) also spiked.

Source: Infosecurity Magazine

Globalnet works with businesses throughout London, Essex, Kent and Herts to ensure their data and networks are secure from all threats. Call us on 0203 005 9650 today to find out how we can provide the right protection for you.

Globalnet aims to be an integral part of your success, providing the best business advice, superior IT support and technology to help you reach your goals. 

How To Quickly Shift To A Work-From-Home Business Model To Maximize Productivity In Today’s Coronavirus Environment

As a business owner today, you are now facing unprecedented challenges to help deal with the coronavirus pandemic. You are asked to self-isolate and practice social distancing to “flatten the curve.” You are asked to allow your employees to work from home to reduce possible exposure and slow the spread of COVID-19.

These are all reasonable requests. However, as a business owner you also need to maximize productivity, bring in revenue and try to grow your business in these demanding times. How can you accomplish these goals when your office is now a ghost town and productivity has fallen off a cliff?

The answer lies in setting up your office to function remotely. If you’ve never implemented a work-from-home policy before, it may seem like a whole different world. Managing an entirely remote workforce goes far beyond giving your employees a laptop and reminding them to check in every once in a while. After all, there are many factors most business owners haven’t ever had to consider, such as:

  • What technologies do I need?
  • How can my employees work from home without compromising the security of our network?
  • How can I make this new work environment as easy, comfortable and productive as possible?

We understand these are unique times. We know that “business as usual” is going to be quite different for an undetermined amount of time. But together we can help you adjust to today’s new normal by giving you the tools, technologies and insights to create a secure and productive work-from-home business environment. Here are three important considerations to getting you set up and running a successful work-from-home business:

1. Avoid employees using home computers or devices. Their mindset may be, “Well, I’m working from home so I may as well use my home computer.” This is a dangerous mistake. Our team works hard to ensure your company computers and network are secure and protected from malware, viruses and cyber-attacks. Their home computers and devices could be littered with tons of downloaded music, videos, images and more. Because it’s more exposed, it can invite malware into your network. Rather, provide a company-approved and secured computer/laptop for employees to use at home.

2. Secure their WiFi access point. Without a secure WiFi access point, you’re essentially leaving a back door open to hackers. That’s because WiFi signals are often broadcast far beyond your employees’ homes and out into streets. Yes, drive-by hacking is popular among cybercriminals today. A few tips for securing your employees’ WiFi access points:

  • Use stronger encryption and a more complex password
  • Hide your network name
  • Use a firewall

These security measures are not difficult to set up. But if you have any questions or need assistance, we will be happy to help get your employees set up remotely.

3. Use a two-factor authentication VPN. VPN stands for virtual private network. It’s essentially a private, encrypted tunnel that goes direct to your IT network in your office. Ideally, you’ll want your VPN to support two-factor authentication. This means it’s doubly secure because your employees will need to call in to access the network. If you don’t have a VPN for your employees to use, you can consider other services, such as Globalnet Connect, which we are currently offering FREE for two months.

As business owners ourselves, we too are having to pivot and work differently than we ever have before. However, because we have the technology and infrastructure in place, we are able to continue as normal, with little disruption to our usual service.

Our team wants to help your business survive and thrive during today’s unique environment. If you and your IT team need extra hands right now…or solutions to help your employees work SECURELY from home…we have software tools, expert staff and resources we’d like to offer you to keep your business as productive as possible.

FREE LIVE WEBINAR – Manage Your Remote Team

Most people managers are experiencing considerable challenges in managing their staff as team members work from home.  The traditional way of managing people doesn’t work, especially in the current environment.

This short webinar will help you to manage the day to day workloads and relationships on a day to day basis.

The reality is that COVID-19 has changed the way we work, potentially for good. This is an excellent opportunity to increase your skill base and ability to manage remote workers.

This 60-minute webinar provides:

5 Essential leadership behaviours

9 Key practices for home working efficiency 

8 Things you must do to maintain engagement

Up to date thinking on remote management

High quality support materials including tools to use in the workplace

Unbeatable offers

CLICK HERE TO REGISTER NOW >>

How To Stop Cyber Attacks During Lockdown

The world is slowing down during this COVID-19 pandemic. People are no longer going out. We’re told to quarantine or self-isolate and not engage in groups.

You can bet there’s one group that’s not slowing down at all. In fact, they’re probably working overtime while the rest of us have our lives turned upside down. Cybercriminals and hackers know there’s no better time to strike than during a global crisis. While you are distracted and spending your time trying to make sense of this new normal, they are finding new ways into your IT network so they can steal data and passwords, compromise your clients’ private information and even demand large ransoms.

dark web scanning

Cybercrime is already on the rise and is expected to cause $6 TRILLION in damages by 2021! But, if history repeats itself, hackers will be out in full force throughout this coronavirus scare. We fully expect in the upcoming weeks that headlines will change from stories about COVID-19 to accounts of a frenzy of cyber-attacks on corporations and small businesses.

Here are solutions you can implement now to help protect your business data, money and productivity:

1. Be more suspicious of incoming e-mails

Because people are scared and confused right now, it’s the perfect time for hackers to send e-mails with dangerous malware and viruses. At this moment, your in-box is probably filled with “COVID-19” subject lines and coronavirus-focused e-mails. Always carefully inspect the e-mail and make sure you know the sender. There are realistic looking gov e-mail address out there now that are not legitimate and are spamming in-boxes across the country.

Avoid clicking links in the e-mail unless it’s clear where they go. And you should never download an attachment unless you know who sent it and what it is. Communicate these safeguards to everyone on your team, especially if they are working from home.

2. Ensure your work-from-home computers are secure

Another reason we expect a rise in cyber-attacks during this pandemic is the dramatic increase in employees working from home. Far too many employers won’t think about security as their team starts working at the kitchen table. That’s a dangerous precedent.

First, if possible, make sure your employees are not using their home computers or devices when working. We know this is economically and practically difficult for many firms, but there can be problems with malware and viruses on unsecured home computers, particularly if its the family computer used by everyone.

Second, ensure your work-at-home computers have a firewall that’s turned on. Finally, your network and data are not truly secure unless your employees utilize a VPN (virtual private network) or are using secure remote connections. If you need help in arranging your new work-from-home environment, we would be happy to get your entire team set up.

3. Improve your password strategy

During crises like the one we are all facing right now, your passwords could mean the difference between spending your time relearning how to grow your business and trying to recoup finances and private data that’s been hacked. Make a point now to reevaluate your passwords and direct your team to create stronger passwords.

Also, while it’s so convenient to save your passwords in your web browser, it also lessens your security. Because web browsers simply require their own password or PIN to access saved passwords, a skilled hacker can bypass this hurdle. Once they access your saved passwords, they can steal as much as they want – credit card information, customers’ private data and more!

Instead, you should consider a password manager to keep all of your passwords in one place. These password managers feature robust security. A few options are LastPass, 1Password and Keeper Security Password Manager.

You, your team and your family have enough to concern yourselves with in regards to staying healthy, living a more isolated lifestyle and keeping your business strong. There’s no need to invite in more problems by letting your computer and network security slide during these times.

If you need additional security advice or would like to have a consultation to discuss how to keep your data safe, simply connect with us today.

Globalnet works with businesses throughout London, Essex, Kent and Herts to ensure their data and networks are secure from all threats. Call us on 0203 005 9650 today to find out how we can provide the right protection for you.

Globalnet aims to be an integral part of your success, providing the best business advice, superior IT support and technology to help you reach your goals. 

Teenager hacks Apple and steals 90 GB of Data

The world’s first trillion-dollar company, Apple, has suffered an embarrassing hack by an Aussie teen. The company is known to be highly security conscious, yet a teenager from Melbourne was able to hack into the company’s  network’s and steal over 90 GB of data over the course of a year.

Investigators discovered the hacker had ‘authorization keys’ on his computer, stored in a folder called ‘hacky hack hack’, and bragged of his accomplishments on WhatsApp. He admitted to the investigators that his dream was to work for Apple.

apple, hack, hacker, security

Apple contacted the FBI after discovering the breach, who in turn contacted the Australian Federal Police. Working together they soon caught the teenager, whose name is being withheld as he is a minor and may be placed in danger if details were released.

The Australian Federal Police raided his home, finding a variety of Apple computers, mobiles and drives, which matched IDs from the attack. The teenager pleaded guilty in court and is now awaiting sentencing. The company claims that no customer personal data was compromised,

The attack follows the news that a group of hackers named Lazarus is said to be behind a crypto-coin stealing malware targeting Macs known as AppleJeus, adapted from a Windows virus. Lazarus is believed to have ties to North Korea.

The last time Apple faced serious security issues was in 2014 when four hackers admitted to using social engineering ‘phishing’ emails to steal female celebrities’ nude photos, including Jennifer Lawrence and Kin Kardashian, from their iCloud accounts. Known as the ‘Fappening’, hundreds of images were released on the 4Chan website and the hackers  have all received between eight-month to 18-month sentences between them.

The latest incident shows that even the most security conscious company is not immune from determined hackers, who are increasingly using ever more sophisticated methods to bypass security. More than ever, it is imperative that business train their staff to recognise social engineering phishing attacks as a last line of defence and to have an effective recovery system in placeto reduce downtime and lost profits.

Most experts recommend that recovery tools and services make up at least 20% of your network security budget to quickly recover from any loss of data and to prevent downtime.

Globalnet works with businesses throughout London, Essex, Kent and Herts to ensure their data and networks are secure from all threats. Call us on 0203 005 9650 today to find out how we can provide the right protection for you.

Globalnet aims to be an integral part of your success, providing the best business advice, superior IT support and technology to help you reach your goals. 

Find out more about Globalnet’s cyber security plans

Superdrug hack affects up to 20,000 customers

The details of almost 20,000 online Superdrug customers have been hacked, the cosmetics retailer has confirmed. Payment card details are not said to be among the data stolen.

Superdrug boss Peter Macnab has emailed customers to inform them of the “possible disclosure of your personal data, but not including your payment card information.”

“On the evening of the 20th of August, we were contacted by hackers who claimed they had obtained a number of our customers’ online shopping information. There is no evidence that Superdrug’s systems have been compromised. We believe the hacker obtained customers’ email addresses and passwords from other websites and then used those credentials to access accounts on our website.”

The email explained that the hackers had “obtained information on approximately 20,000 customers but we have only seen 386.”

According to IT site, The Register, it seems that the hackers had “taken passwords and usernames stolen from one website and used them to log into accounts on other sites, exploiting the fact people reuse their passphrases across various online services and profiles.”

The Superdrug email also stated that customers’ names, postal addresses and “in some instances” dates of birth, phone numbers and points balances “may have been accessed”. Superdrug advises its customers to update their Superdrug.com password “now and on an on-going, frequent basis.”

Action Fraud and the police have been notified and it is believed the hackers contacted Superdrug to extort money from the business to keep the hack quiet.

Globalnet works with businesses throughout London, Essex, Kent and Herts to ensure their data and networks are secure from all antivirus, malware and ransomware threats. Call us on 0203 005 9650 today to find out how we can provide the right protection for you.

Globalnet aims to be an integral part of your success, providing the best business advice, superior IT support and technology to help you reach your goals. 

Find out more about Globalnet’s cyber security plans

Facebook Favours Free Speech Over Fake News Removal

In a recent Facebook media presentation in Manhattan, and despite the threat of social media regulation e.g. from Ofcom, Facebook said that removing fabricated posts, or fake news, would be “contrary to the basic principles of free speech”.

Fake News

The term ‘fake news’ has become synonymous with the 2016 US general election and accusations that Facebook was a platform for fake political news to be spread e.g. by Russia. Also, fake news is a term that has become synonymous with President Trump, who frequently uses the term, often (some would say) to act as a catch-all term to discredit/counter critical stories in the media.

In essence, fake news refers to deliberate misinformation or hoaxes, manipulated to resemble credible journalism and attract maximum attention, and it is spread mainly by social media. Facebook has tried to be seen to flag up and clean up obvious fake news ever since its reputation was tarnished by the election news scandals.

What About InfoWars?

The point was made to Facebook at the media presentation by a CNN reporter that the fact that InfoWars, a site having been known to have published false information and conspiracy theories, has been allowed to remain on the platform may be evidence that Facebook is not tackling fake news as well as it could.

A Matter of Perspective

To counter this and other similar accusations, Facebook has stated that it sees pages on both the left and the right side of politics distributing what they consider to be opinion or analysis but what others, from a different perspective, may call fake news.

Facebook also tweeted that banning those kinds of pages e.g. InfoWars, would be contrary to the basic principles of free speech.

A Matter of Trust

Ofcom research has suggested that people have relatively little trust in what they read in social media content anyway. The research showed that only 39% consider social media to be a trustworthy news source, compared to 63% for newspapers and 70% for TV.

Age Plays A Part

Other research from Stanford’s Graduate School of Education, involving more than 7,800 responses from middle school, high school and college students in 12 US states focused on their ability to assess information sources. The results showed a shocking lack of ability to evaluate information at even as basic a level as distinguishing advertisements from articles. When you consider that many young people get their news from social media, this shows that they may be more vulnerable and receptive to fake stories, and their wide networks of friends could mean that fake stories could be quickly and widely spread among other potentially vulnerable recipients.

Although Facebook is known to have an older demographic now, many young people still use it, Facebook has tried to launch a kind of Facebook for children to attract more young users, and Facebook owns Instagram, partly as a means to try and mop up young users who leave Facebook. It could be argued, therefore, that Facebook, and other social media platforms have a responsibility to regulate some content in order to protect users.

What Does This Mean For Your Business?

Fake news stories are not exclusive to social media platforms as the number of retractions and apologies in newspapers over the years are a testament. The real concern has arisen about social media, and Facebook particularly, because of what appears (allegedly) to have been the ability of actors from a foreign power being able to use fake news on Facebook to actually influence the election of a President. Which party and President is in power in the US can, in turn, have a dramatic effect on businesses and markets around the world, and the opportunities that other foreign powers think they have.

Facebook is also busy fighting another crisis in trust that has arisen from news of its sharing of users’ personal data with Cambridge Analytica, and the company is focusing much of its PR effort not on talking specifically about fake news, but about how Facebook has changed, why we should trust it again, and how much it cares about our privacy.

Meanwhile in the UK, Ofcom chief executive Sharon White, has clearly stated that she believes that media platforms need to be “more accountable” in their policing of content. While this may be understandable, many rights and privacy campaigners would not like the idea that free speech could be influenced and curbed by governments, perhaps to suit their own agenda. The arguments continue. 

Globalnet is a managed servicer provider for a wide range of businesses throughout London, Essex, Kent and Herts. Call us today to find out how we can improve your IT infrastructure and increase productivity.

Globalnet aims to be an integral part of your success, providing the best business advice, superior IT support and technology to help you reach your goals. 

Google Chrome New ‘Site Isolation’ Security Feature Activated

The new ‘Site Isolation’ security feature for the Google Chrome browser has been switched on, and could protect users from log-in credentials theft.

Decade-Long History

The newly switched-on feature actually has a decade-long history in the making. It has been reported that Google invested those engineer-years, mostly in the last 6 years, and a lot of money in producing a DiD (defence-in-depth) feature, and what is a now essential defence against a prolific class of attack.

What Does the Google Chrome Site Isolation Do?

It has recently been discovered that all modern chips / processors have security vulnerabilities in them that can contribute to the success of ‘data leakage’ attacks. These vulnerabilities, dubbed Spectre and Meltdown (Meltdown only on Intel chips), can be used by hackers to steal passwords or other confidential data from computers and mobile devices through popular web browsers like Chrome, Internet Explorer, Firefox, and Safari for Macs or iOS.

With Site Isolation enabled, each renderer process contains documents from a maximum of one site which means that all navigations to cross-site documents cause a switch in processes, and all cross-site iframes are put into a different process than their parent frame. This ‘isolation’ of the processes provides effective detection against data leakage attacks like Spectre, which means that the vast majority of Chrome users are now theoretically safer from this one kind of attack. It has also been reported that work is underway to protect against attacks from compromised renderers.

It Does Sap Some Memory

One of the trade-offs that Google has had to make to in order to make this feature effective is greater resource consumption. With Site Isolation on, there is a 10-13% total memory overhead in real workloads due to the larger number of processes. Google is reported to be working on trying to reduce the memory burden.

Even 10-13% is good compared to the 20% memory overhead that was being used when Chrome 63 debuted with Site Isolation.

Not Android Yet – But Soon

Site Isolation is scheduled to be included in Chrome 68 for Android but reports indicate that Google is still working on resource consumption issues before that can be rolled out.

SSL Security Added

Google Chrome has also added security warnings for sites that do not have SSL Certificates, which switch websites from HHTP to HTTPS protocol. The warning alerts users to the fact that any information they enter into the set, such as usernames, passwords or email addresses may not be secure. Furthermore Google is gradually moving to penalise sites in its search engine without HTTPS with lower page rankings.

What Does This Mean For Your Business?

The switching on of this feature is, of course, good news for businesses, as it is an additional, free way to strengthen cyber resilience against a popular kind of attack that could have serious consequences. This is of particular importance when businesses are trying to do everything possible to achieve and maintain compliance with GDPR.

Up until now, all businesses have heard is that all modern processors have security flaws in them, and that software patching is the only real answer. Back in May, another 8 flaws, in addition to Spectre and Meltdown, were discovered in processors, dubbed Spectre Next Generation (Spectre NB). At least the switching-on of this Chrome feature is one tangible step in the journey to patch these vulnerabilities before cyber-criminals manage to exploit them all. Hopefully, more, similar features will be introduced across other browsers in the near future.

Globalnet works with businesses throughout London, Essex, Kent and Herts to ensure their data and networks are secure from all threats. Call us on 0203 005 9650 today to find out how we can provide the right protection for you.

Globalnet aims to be an integral part of your success, providing the best business advice, superior IT support and technology to help you reach your goals.