UK & Ireland Featured Project: Cadent Mineral Blue / isCompliant Implementation (1603)

QEM Solutions have been assisting Cadent Gas with the implementation of our Mineral Blue and isCompliant software. By developing a bespoke connection between the two suites, QEM were able to establish a streamlined process for gathering project milestone achievements. Balancing these achievements with audit and inspection results have enabled Cadent to to get a true measure of project success.

Tell Me More...
Overseas Featured Project: Capita Symonds - Valve Inspections

QEM Solutions were contracted to carry 3rd party inspection and witnessing activities on a series of valves fabricated in Germany for a series of SGN contracts throughout Scotland.

Tell Me More...
We are QEM Solutions We are QEM Solutions

We are problem solvers. We are organisers. From the project start-up to the very final evaluations and analysis, we can bring enthusiasm to each and every part of your project.

 

News Spotlight Are we doing it right? Effective meetings in Microsoft Teams

Since the Covid onslaught, businesses worldwide have adopted Microsoft Teams in place of meeting in person. And while it’s true that many of us are now adept with the software, it’s likely that others still use only the bits that suit them best. While we may get through the working day in one piece without some functionalities and etiquette, we could probably work better with the full toolset to hand. And why not? There’s still a long way to go before we’re all back in the office.

Read more...

News

Back to News
24 Mar 2022

Russian cyber attack – the war at your own desk

While the war in Ukraine deepens, it is inevitable that Russia will use every available tool in its armoury to bring down any and all opponents. Part of this arsenal will inevitably be cyber-attack, either as an overspill from Russian cyber-attacks on Ukraine, or through Russian sponsored attacks on other nations.

However, it is possible to stay safe if we remain vigilant and adopt some crucial security protocols. Doing so not only protects you, your colleagues, and your clients, but plays a small but crucial role in resisting the spread of an illegal war.

Step 1: MFA

Turn on Multi-Factor Authentication (MFA). MFA provides an additional layer of protection to an account and helps to stop hackers from breaking into those accounts, even if they have your password. It works by asking for more information from you to prove your identity – such as a code that is sent to your phone. Adding MFA onto any personal or work accounts and emails is a great way of staying secure.

Step 2: Strong and separate passwords

Use strong and separate passwords for different accounts. If a hacker breaks into your account, they may be able to do anything from resetting your password, to accessing information about you, and even the business you work for. Passwords must be strong and different from all other accounts that you use. Using three random words is an ideal way of creating a password because it is both robust and memorable.

Step 3: Save passwords to your browser

This will help to make sure that you do not lose or forget your passwords, as well as protecting you from some cybercrime, such as fake websites. However, do ensure that you protect your saved passwords in case your device is lost or stolen: lock your device when it is not being used, use a strong password on your device, or use MFA or biometrics on the device. Even better, do all of these.

Step 4: Update, update, update

If a device has out-of-date software, apps, or operating systems, then it is vulnerable to security exploits. By updating your device with updates that companies provide, it helps to remove these exploits and keep your device safe. Many devices need to be updated manually; however, you may get reminders on your device to do so. Do not ignore these reminders and check for updates frequently.

Step 5: Back up your data

Keeping a regular backup of data means that you have a recent version of your saved infromation. This helps you to recover data quicker if a device has been lost or stolen. Remember that automatic backups can be used to save information to cloud storage regularly without you having to remember.

Step 6: Beware convincing phishing emails

Phishing emails are one of the biggest dangers of being online. These emails are designed to look genuine, but can contain malicious links to malware, or urge you to carry out a task such as providing important details about yourself or the business you work for. When going through your emails, always think before you act. Be wary of communications that implore you to act immediately or offer something too good to be true. Pay close attention to potential spelling and grammar errors, links that lead off to websites, and the person that is sending the email. If you are in doubt, report the email or try to verify an email request by contacting a company/person directly. Hackers can create email accounts that take on another person’s identity, so if in doubt, pick up the phone or reach out.

For further help: