Entries by Laura

Is it Safe to Re-use Passwords?

Last week we had the opportunity to sit on a Cybersecurity Panel at an event hosted by NatWest. In the question and answer session, a gentleman asked me about passwords and whether keeping all your passwords in a central location, i.e. a password keeper on your phone was actually secure. I said that no method […]

Must-Read Cybersecurity Articles

Following is a short list of recent articles on cybersecurity and advice on how to avoid the latest threats and protect your network. Keep yourself safe with these cybersecurity tips from GCHQ Ciaran Martin, GCHQ’s director general of cybersecurity, gives advice on preventing cyber-attacks. The Best Free Antivirus Protection of 2016 On a tight budget […]

The Advantages of Managed Hosting for Small Businesses

Managed hosting is an IT service in which a hosting provider takes care of all server and networking needs including the managing, monitoring and maintaining of the complete environment along with any hardware procurement needs. The end user would only pay a flat monthly fee and perhaps set up costs depending on the agreement. The […]

What is Phishing, Vishing, SMiShing and Pharming? (Infographic)

Target information: Full name User name(s) Email address Address Date of Birth Social Security Number (US only) Credit/Debit card details Passwords, Access codes and PINs Mother’s maiden name Place of birth or other common password retrieval question Phishing is a scam which targets victims via email where individuals are encouraged to click through to fraudulent […]

Our New Data Centre is Up and Running

After years of planning, consulting and construction our new Dedicated Data Centre is complete! It has been a long term company goal to have a completely modern and secure data centre to better serve our clients. The advantage of having our own is that we no longer have to rely on outside companies to host […]

How Scammers Monetise Stolen Credit Card Data: Infographic

Perhaps you’ve wondered how scammers actually make money from stolen credit/debit card data. So many checks are in place to keep card data from being used maliciously. But scammers are like water running down hill, you build an obstacle, they find another way; when one scam is blocked another takes its place. With farmed credit/debit […]

Mark Zuckerberg Has Been Hacked, Your Account Could Be Next

Late on Sunday, Facebook founder, Mark Zuckerberg’s social media accounts for Twitter and Pinterest were hacked. The hacker(s) known only as OurMine Team flagrantly posted messages on Zuckerberg’s Twitter page showing off their access. The posts have since been deleted. Zuckerberg broke the cardinal rule of online security – never reuse passwords. According to one […]

The LinkedIn Data Dump: How to Check Your Account

In 2012 LinkedIn was hacked by Russian cyber criminals, who extracted more than 164 million account details including usernames and passwords. Initially, there was only thought to be 6.5 million accounts compromised, that number has risen steadily to the now confirmed number of 164,611,595 million accounts. Last week the stolen data was offered on the […]

What’s Your Weakest Link in Cyber Security? Infographic

Each year businesses lose millions of pounds to cyber criminals. On a daily basis, company websites are breached, compromising personal data and costing thousands. Therefore, it is important to know where the weakest link in cyber security lies and how to prevent attacks in the future. Knowing where vulnerabilities are is the first step to securing […]

Our New Offices

We are pleased to formally announce that Metropolitan Networks is officially moved into its own building, which is a newly refurbished manor house on the outskirts of Orpington, South London.  After years of planning and preparation the renovations are very nearly at an end. We are also in the process of building our own secure […]

5 Must-See TED Talks on Cybersecurity and Hacking

Ted Talks are an excellent source of bite-size information on almost any subject, here are some of the best on the topic of  cybersecurity. What’s Wrong with Your Pa$$w0rd? by Lorrie Faith Cranor Lorrie Faith Cranor has done extensive password research to figure out the common passwords people are using how these are then guesses […]

Atlantic Endeavour

Let’s have a break from the usual tech talk. Imagine a tiny row boat at the mercy of the Atlantic Ocean, mountainous waves, never ending fatigue in a cycle of gruelling, back breaking rowing and fitful sleep in the constant movement of the ocean. Nothing around you as far as the eye can see – […]

We Are Expanding to Saudi Arabia

We are happy to announce that we have new offices opening in Riyadh, Saudi Arabia with the intention of better serving new and existing Met Net clients in the Middle East. We are now established on three of the seven continents, (four more to go!) Our offices in Riyadh will be headed by Ali Siddiqui […]

News: Critical Fortinet Firewall Updates

On a regular basis we implement updates to clients’ hardware for the latest patches. Usually the updates are routine, but recently, we’ve contacted all of our clients about an urgent update to specific firmware versions. It addressed a login vulnerability which compromised the security of their firewall.  The string of updates has been successful and […]

Do I Really Need a Network Audit?

What is a Network Audit? A Network Audit is a comprehensive health check and overview of a company’s network. The final report will include: A device inventory Connectivity overview Diagrams of all your network devices (servers, switches, firewalls, etc.) How traffic is managed How your resources are impacted. Why a Network Audit? The purpose of […]

Gmail Saving Us From Ourselves

How it works – the Undo Send feature must be activated, instructions below. When sending an email there will be a 5 to 30 second delay before the email leaves the server and is sent to the intended recipient(s). How to Activate Undo Send: Log into Gmail on a desktop Click on the Gear icon Scroll […]

Outsourcing is a Dirty Word, or is it?

In recent years, companies large and small have favoured outsourcing rather than hiring an in-house team to meet their needs. All types of services are available, everything from office cleaning and IT support to mailing and copy machine rental/maintenance. Of course there are pros and cons with hiring an outside firm but most businesses which […]

An Announcement!

We are pleased to announce that we are supporting a team of British rowers, Atlantic Endeavour, in The Talisker Whisky Atlantic Challenge, which is an ocean endurance race of 3,000 nautical miles from the La Gomera, Canary Islands to Antigua, Caribbean in December 2016. They are also attempting to break two world records: the fastest […]