Mobile Menu icon

Whatever you need we've got IT covered.

Our highly experienced support team are capable of handling any IT support issue, so you can relax and concentrate on making your business a success.

In the event of any problems, our standard support hours are 9am-5.30pm, Monday-Thursday, and until 5.00pm on Friday. We offer an extended hours contract whereby the support hours become 8am-6pm, Monday-Friday. If you need a quick solution to a technical problem, then our live remote-assistance tool can help. A member of our dedicated support team can liaise directly with you to find the answer to your question.

Step One - Call 0844 800 4456



Support Form

If you are in need of support please fill in the form below or call us on 0844 800 4456


Contact Us

London Office:

Main number: 020 3507 1920

Sales number: 020 3507 1922

Technical support: 0844 800 4456

Essex Office:

Main number: 01268 494 100

Sales number: 01268 494 160

Technical support: 0844 800 4456



Hacked: Carphone Warehouse joins the growing list of cyber-victims

The announcement last month of the data breach and consequent exposure of personal details of 2.4 million customers of the well-known mobile and technology company, Carphone Warehouse (CW), should serve as yet another warning to businesses of all sizes that systems remain vulnerable.

The details of attack are not yet known and the cyber security community awaits the details with eagerness to ensure that no new attack approach has been developed that they must react to.

In the meantime, customers will be taking the steps advised by CW to minimise the potential impact that personal details such as names, addresses, bank details and dates of birth. These details provide cyber criminals with the additional information that can enable sophisticated phishing emails and even phone calls to be made more confidently, in search of access details to more valuable data and accounts.

Customers have reacted angrily in response to the delay of 3 days before notifications of the breach were made public and affected customers contacted. CW have defended their approach and the need to have a plan in place to deal with the aftermath of any data loss is clearly highlighted in this case.

Who will be next?

CW will have been investing heavily in security measures – it is assumed – and yet a breach has occurred and this serves as an effective reminder that no business should assume they are not a target.

The latest PWC Information Security Breaches Survey (2015) commissioned by HM Government shows that security breaches continue to grow in number and impact across large and small businesses alike; 90% of large organisations and 81% of small organisations in the survey have suffered a security breach. Both measures were an increase over the previous year.

The impact of a data breach should not be underestimated with smaller organisations generally less able to withstand either the financial loss or the longer term reputational damage or even a combination of both. In addition the fines that are possible presently are due to be increased considerably when new EU wide rules become effective.

What should be done?

The Government has been encouraging all organisations to adopt, at the very least, the Cyber Essentials security standard launched last year. Cyber Essentials has two levels one requiring a self-certification questionnaire to be completed and independently assessed. The Plus level requires an independent test of the security system itself. The level adopted by the business will be their decision and will reflect the nature of the business.

Even if the business decides not to follow through to accreditation, adopting the five disciplines that comprise Cyber Essentials will protect the business from around 80-90% of the prevailing Cyber threats according GCHQ, the Government’s intelligence and security organisation.

The five disciplines cover the following areas: -

  1. Boundary firewalls and internet gateways - these are devices designed to prevent unauthorised access to or from private networks, but good setup of these devices either in hardware or software form is important for them to be fully effective.
  2. Secure configuration – ensuring that systems are configured in the most secure way for the needs of the organisation
  3. Access control – Ensuring only those who should have access to the systems have access and at the appropriate level.
  4. Malware protection – ensuring that virus and malware protection is installed and is up to date
  5. Patch management – ensuring the latest supported version of applications is used and all the necessary patches supplied by the vendor have been applied.

Cyber-attacks can affect any business if the appropriate security measures are not put in place and tested on a regular basis. Yellowspring actively encourage businesses to review their security and ensure that they have a future proof strategy in place to safeguard their business against all forms of basic cyber-crime.

Get in touch today to discuss what we can do to help protect your business against cyber-attacks.  Tel: 01268 494160 or email


Latest News

The humble USB has been banned in the offices of IBM - does your business

Read more

You have worked hard to build your mailing list but GDPR could threaten it if

Read more

We explore how the financial industry will be affected when the new data protection law

Read more