Latest News for 4TC
We have loads to say!
We have loads to say!
Most cyber attacks make the news only after the work is done. The intrusion that ends up in the press is typically the final stage of a chain that began months earlier, with a username and password listed for sale on a criminal forum. Verizon’s 2025 Data Breach Investigations Report found that 22% of breaches begin with stolen credentials, and 88% of attacks against basic web applications involve them. The November 2025 cyber attack on three London councils, where shared IT systems between Kensington and Chelsea, Westminster, and Hammersmith and Fulham allowed disruptions to spread across boroughs, is the public version of something that happens to far smaller organisations every week.
Specific software is necessary to access the dark web, a layer of the internet that Google or Bing does not index. It hosts criminal marketplaces, forums, and data dumps where stolen login details change hands. Credentials get there through a handful of routes: phishing emails, infostealer malware that scrapes passwords from infected machines, and large-scale breaches at third parties whose users reused the same password elsewhere. Verizon’s report found that 54% of ransomware victims had credentials appear in infostealer logs before the attack itself was carried out, which shows how often the underground sale precedes visible damage.
A leaked password rarely gets used the same day it’s harvested. It enters circulation; gets traded; is often sold in bulk; and may go through several hands before anyone tries it against a live system. IBM’s 2025 Cost of a Data Breach Report puts the global mean time to identify and contain a breach at 241 days, the lowest figure in nine years but still over eight months. Staff details can sit on a criminal forum for the better part of a year before any sign of misuse appears in the environment they came from.
A credential set rarely surfaces in isolation. The accompanying records can include date of birth, home address, National Insurance number, mobile number, and previous passwords used by the same individual. Verizon’s analysis of breached databases found that email addresses appeared in 61%, phone numbers in 39%, and government-issued IDs in 22%. Together they make identity theft, business email compromise, and tailored phishing far simpler to pull off, particularly when an attacker can match a personal address to a corporate login.
Headline coverage tends to follow large enterprises, but the UK government’s Cyber Security Breaches Survey 2025/2026 estimates that around 612,000 UK businesses identified a cyber breach or attack in the last 12 months. Smaller organisations are appealing to attackers because they hold fewer dedicated security staff, less mature monitoring, and accounts that often unlock access to clients, suppliers, and partners further up the chain. Many SMEs hold the keys to far larger client and supplier networks, whether it’s an accountancy firm with shared portals for its clients, a managing agent with access to dozens of landlords, or a marketing consultancy with admin rights on a customer’s website. One compromised credential at the smaller end can give an attacker access to the larger one.
Dark web monitoring for businesses scans the criminal forums, paste sites, marketplaces, botnets, and chat groups where stolen credentials surface. Credential monitoring for UK businesses tracks specific identifiers, usually company email domains, and flags any time a match appears in a known dump or fresh listing. The output is timely intelligence on which of your accounts have been exposed, when, and in what context, which lets the response be precise rather than speculative. Done properly, this is continuous. Criminal forums refresh constantly, and a credential clean from six months ago may show up this week. It sits naturally alongside the day-to-day work of proactive IT support, where the goal is to address potential issues before they cause real damage.
When a match comes back, the response is straightforward and time-sensitive. Reset the password on the affected account, force the same on any system where that password may have been reused, check for unusual logins, enable multi-factor authentication if it’s not already in place, and brief the staff member involved on what was exposed. None of these steps are complex, but they only work if someone has told you the credential is out there. Without monitoring, the alert tends to come from a bank, a customer, or a regulator, by which point options have narrowed considerably. Credential monitoring works best as one layer in a defence-in-depth approach, sitting alongside managed anti-virus, patching discipline, and staff awareness.
The pattern across recent UK incidents is consistent. The intrusion that surfaces in headlines began, weeks or months earlier, as a line on a forum no one was watching. Knowing what’s already been exposed is one of the few defensive moves that doesn’t rely on guessing what an attacker will do next.
4TC’s Dark Web ID monitoring watches the darkest corners of the web so you don’t have to. Speak to the team today to find out if your credentials are already exposed.
On 24 November 2025, IT systems across three central London boroughs went dark.
The Royal Borough of Kensington and Chelsea, Westminster City Council, and the London Borough of Hammersmith and Fulham were all taken offline in what investigators treated as a coordinated cyber incident, with the National Crime Agency, the Metropolitan Police, and the National Cyber Security Centre all subsequently involved. Kensington and Chelsea later confirmed that attackers had copied and exfiltrated historical data from its systems. The three councils share parts of their IT infrastructure, and that shared architecture is precisely what made a single compromise so consequential.
For London businesses, a cyber attack on this scale should make you think: if three neighbouring councils sharing IT can be brought down by a single compromise, what would a similar event do to your operation?
The logic of shared IT services is sound on paper. Pooling resources across organisations reduces costs, avoids duplication, and often improves the quality of systems that no single entity could afford alone. Plenty of other organisations, from NHS trusts to private businesses, operate on the same principle, and so do most SMEs, albeit in a different form. Whether you rely on a cloud platform, a managed IT provider, or a suite of SaaS tools, your digital environment is connected to other organisations’ environments in ways that are not always visible.
The councils’ experience illustrates what happens when a shared system is compromised at a point that sits upstream of multiple tenants. One vulnerability, one set of stolen credentials, one unpatched entry point, and the blast radius extends to every organisation drawing on the same infrastructure. Hammersmith and Fulham had its public-facing services suspended even though investigators found no direct evidence its own systems had been breached. Proximity to a shared service was enough to force significant disruption.
The lesson isn’t that shared services are inherently unsafe, but that the junctions where dependencies converge need proportionate security controls. If you don’t know where those junctions sit in your own environment, you can’t defend them.
The UK Government’s Cyber Security Breaches Survey 2025 found that 43% of UK businesses experienced a cyber security breach or attack in the preceding year. For large businesses the figure was considerably higher, at 74%. IT security in London has historically been framed as an enterprise concern, but the economics of automated attack tooling have closed that gap. Those tools probe for weaknesses across thousands of targets simultaneously, and a small business using the same cloud platform or managed service as a larger target can find itself caught in the same sweep.
Most London SMEs are, in practice, running a version of the shared-services model: cloud-hosted email, third-party CRM, outsourced IT support, and shared accounting platforms. Every one of those connections is a potential entry point. The council’s incident is unusual in scale, but the underlying mechanics are not: one compromised account, one exploited system, cascading disruption. The same pattern plays out against businesses of every size.
Organisations that contain these incidents quickly almost always have one thing in common: visibility before the attack gets underway, rather than defences only at the point of impact.
A common misconception is that cyber incidents begin the moment attackers enter a network. Instead, they begin weeks or months earlier, when credentials are stolen, traded, and eventually used. According to IBM’s 2024 Cost of a Data Breach Report, breaches involving compromised credentials took the longest of any attack vector to identify and contain, at nearly ten months. That is a significant window during which stolen credentials may be circulating on dark web forums before anyone inside the affected organisation is aware.
The attack on the councils almost certainly followed a similar pattern. Ransomware and data exfiltration events of this scale do not typically happen spontaneously. Attackers gather information, test access, and move deliberately. The starting point is almost always stolen credentials: an employee’s login, a service account password, or an email address paired with a reused password from an older breach.
Dark web monitoring addresses that gap. Rather than waiting for a breach to become visible inside your own systems, it scans the forums, marketplaces, and encrypted channels where stolen credentials are bought and sold and raises an alert when your organisation’s data appears. The window between a credential being stolen and it being used is often the only opportunity to invalidate it before it causes damage. Most London businesses are not watching that window at all.
4TC’s Digital ID service monitors the dark web continuously for email credentials and other company data associated with your domain. If your team’s logins surface in a breach dump or credential marketplace, you will know about it before an attacker uses them to gain access to your systems. It complements broader security measures such as managed anti-virus, fully managed IT support, and cloud backup.
The attack on the councils made headlines because it hit recognisable names in a concentrated area. The same dynamics are at work across businesses of every size: shared dependencies, credential-based entry points, and long detection windows that give attackers time to move. The councils had the NCA, NCSC, and specialist incident responders from NCC Group called in. Most SMEs do not have that infrastructure to fall back on.
Business continuity in a cyber attack scenario often comes down to how quickly the first indicators are spotted. Credentials circulating on the dark web are one of the earliest. The more practical response is to reduce the window in which an attacker can operate undetected, and that starts with knowing whether your credentials are already out there.
Find out how 4TC’s dark web monitoring can give your business an early warning against credential theft. Get in touch with the team today.

Most businesses in Bishop’s Stortford would not describe their IT approach as reactive. They have someone to call when things go wrong; they get problems fixed, and most of the time, things work.
The difficulty is that ‘most of the time’ is doing a lot of work in that sentence, and the costs of the gaps rarely appear on a single line of any invoice. But proactive IT support changes the game.
Reactive IT support, often called break-fix, operates on a simple principle: something stops working, and someone fixes it. There is no ongoing monitoring, scheduled maintenance, or structured approach to security.
For Bishop’s Stortford businesses, this can feel reasonable when IT needs are modest. The problem is that IT environments grow more complex over time, and complexity without oversight accumulates risk quietly in the background.
The most visible cost of reactive IT support is downtime, but the full picture is harder to see.
Emergency call-out rates carry a premium, staff lose hours waiting for fixes, and in some cases data cannot be fully recovered. The indirect costs, such as missed deadlines, delayed client communications, and lost productivity, rarely appear on a single invoice.
Cyber security costs are less visible still. Without active IT management, Bishop’s Stortford businesses are left with:
Recent data reveals that 71% of UK organisations experienced a cyber-attack in the past year, with the average annual SME losses from poor cyber security reaching £3.4 billion.
The shift towards proactive IT support comes down to a simple calculation: unplanned problems cost more than planned prevention. Proactive IT management treats your systems as something to be maintained continuously, rather than only being attended to when they break.
For Bishop’s Stortford businesses operating in competitive markets, where client expectations are high and margins are tight, that kind of operational resilience is increasingly the baseline rather than a premium.
A well-structured proactive IT arrangement covers several areas that reactive support leaves unaddressed:
When these are taken together, they represent the difference between an IT environment that is under control and one that is accumulating risk quietly in the background.
The most immediate benefit of proactive IT support is a reduction in unplanned downtime. Fewer failures mean fewer interruptions and fewer emergency call-outs, and for a small team in Bishop’s Stortford, even a single avoided outage can justify the investment.
Over time, the advantages extend further. Businesses with managed IT support typically see:
A proactive managed IT partner helps Bishop’s Stortford businesses make informed decisions about their technology rather than responding to problems as they surface.
At 4TC Services, we provide managed IT support to businesses across Bishop’s Stortford and Hertfordshire, covering monitoring, security, backup management, and structured IT reviews as part of an ongoing relationship rather than a series of one-off fixes.
If your current IT support feels more reactive than it should, get in touch with the team for a straightforward conversation about what a different approach might look like.

Pick up almost any post-incident analysis of a business data breach and you will find the same pattern: the vulnerability wasn’t new. It had been sitting inside systems nobody was actively watching, sometimes for months, before it was exploited.
That pattern is not confined to large enterprises. Smaller businesses in Bishop’s Stortford and across Hertfordshire carry the same categories of accumulated risk, often without knowing it. The difference is that a smaller organisation rarely has the capacity to absorb the consequences when those risks finally surface.
It does not take a dramatic failure for an IT environment to become genuinely risky. It takes growth, time, and the absence of structured oversight.
As businesses hire staff, adopt new software, and shift more work to the cloud, their IT estate grows more complex. Old systems persist well past their useful life because replacing them feels disruptive. When a member of staff leaves, their accounts and access rights may not be fully revoked. When a new application is onboarded, nobody thinks to review what data it can reach. Each of these is a small administrative gap on its own. Together, they create an environment with a much larger attack surface than most business owners would expect if they stopped to map it.
The vulnerabilities that cause the most damage are mundane, technical, and easy to overlook when attention is focused on running the business.
Outdated and unpatched systems
The UK government’s own guidance frames patch management as a foundational cyber hygiene measure, and for good reason. Systems running outdated software present an open entry point. The 2024 UK Cyber Security Breaches Survey (Department for Science, Innovation and Technology) notes that the most common cyber threats are relatively unsophisticated, which means organisations that fall behind on patching and updates are accepting a risk they do not have to carry.
Weak or untested backupsMany businesses believe their data is protected because files sync to a cloud drive. That is not the same as a managed backup service with tested, offsite copies and a documented recovery process. Without verified restore capability, a ransomware attack or accidental deletion can become permanent data loss. The backup is only as useful as its last successful test.
Unmanaged devicesWhen employees use personal laptops or phones to access business systems, those devices may carry no endpoint protection, no encryption, and no visibility for the organisation’s IT function. If a device is lost or compromised, the business may not find out until the damage is done. This risk has grown more pronounced as hybrid working has extended the reach of business IT well beyond the office.
Poor access control and unused accountsEvery user account with more access than it needs is a potential entry point. Former employee credentials that were never deactivated have been the origin of breaches at businesses of every size. Without a structured approach to digital identity management, these accounts accumulate quietly in the background.
The 2024 UK Cyber Security Breaches Survey found that half of UK businesses experienced a cyber security breach or attack in the preceding twelve months. Across all businesses that identified a breach, the average cost of the most disruptive incident was £1,205. Where that breach produced a material outcome, such as actual data loss or system compromise, the figure rose to £6,940 for businesses of any size and approximately £40,400 for medium and large organisations. The problem is that the ones which do cause harm tend to cost considerably more than organisations have set aside.
Availability losses compound the picture. Research by Beaming, a specialist business ISP, found that UK businesses collectively lost over 50 million hours and £3.7 billion to internet failures in 2023 alone, a cost that has risen by 400% over five years as dependence on cloud services has increased. SMEs in particular averaged 19 hours of downtime in 2023. Two lost working days a year may not sound catastrophic until it coincides with a client deadline or a peak trading period.
Despite these risk levels, only 31% of UK businesses undertook a cyber security risk assessment in the previous year, according to the same government survey. In our experience working with smaller businesses, formal IT assessments are rare.
The gap between risk exposure and risk awareness is where most IT incidents originate. A structured IT review does not need to be lengthy or expensive. It should establish whether systems are patched and current, whether access rights reflect the present structure of the business, whether backups are being tested, and whether devices connecting to company systems meet a minimum-security standard.
For businesses without the internal resource to carry out these reviews consistently, a fully managed IT support arrangement means the work happens in the background, routinely, rather than whenever something breaks.
Reactive IT support resolves problems after they occur. Proactive IT management covers continuous monitoring, patch management, endpoint protection, and regular system reviews, preventing most problems from occurring in the first place. For a business with ten or twenty staff, avoiding a two-day outage costs considerably less than recovering from one.
4TC Services works with businesses across Bishop’s Stortford and Hertfordshire to provide the kind of consistent, structured IT oversight that reduces accumulated risk. That includes managed anti-virus and endpoint protection, access control, backup services, and regular system reviews, without requiring a business to build or maintain an in-house IT team.
The risks outlined here are not unusual, and they are not inevitable. They develop where IT management runs on autopilot. The first step toward addressing them is understanding what you have, what is missing, and where the gaps are.
To find out where your business might be exposed, get in touch with the team at 4TC for a no-obligation IT review.

Most IT budgets are not really budgets at all. They are a collection of last year’s invoices, carried forward, with a rough figure added for anything overdue and a glimmer of hope that nothing will go wrong. For many SME leaders, IT spending only becomes visible when something breaks, and the conversations that follow are almost always about the bill rather than the plan. The problem with this approach is that it consistently costs more with the accumulated weight of emergency callouts, lost hours, and problems that were left until the last minute.
The businesses that handle IT well think about it the way they think about staffing or premises: as a structured, predictable investment that should directly support what the business is trying to do. Getting IT budgeting for SMEs right doesn’t mean spending more, but spending with a clear rationale behind every line.
Before you can build a credible IT budget, you need an honest picture of what poor IT continuity is already costing. That figure rarely appears on any invoice. According to Beaming’s research into UK business connectivity, UK businesses lost £3.7 billion to internet connectivity failures in 2023, with SMEs enduring an average of 19 hours of downtime each. That is more than two working days, quietly written off every year.
Security incidents are harder to average out, but the UK Government’s Cyber Security Breaches Survey 2024 puts the mean cost of the most disruptive breach at £6,940 for any size business, rising to around £40,400 for medium and large organisations. Half of UK businesses experienced a cyber attack or breach in the preceding twelve months; for medium-sized organisations, that figure was 70%. Yet only 31% had completed a formal cyber risk assessment. That gap, between the prevalence of risk and the absence of any structured response to it, is precisely what planned IT investment is designed to close.
Hardware replacement is the most foreseeable IT cost and the one most commonly deferred. Running ageing devices past their useful life does not save you money. It erodes performance, increases support time, and eventually forces an unplanned purchase under pressure. A rolling refresh cycle built into the annual budget turns a recurring crisis into a manageable line item. 4TC’s fully managed IT service includes device monitoring that flags hardware approaching the end of its useful life before it creates a problem.
Software licences and subscriptions proliferate without oversight. Many organisations pay for tools that are unused, duplicated, or long superseded. An audit at the start of each budget cycle usually surfaces savings, and licence compliance belongs in the same pass: the penalties for inadvertent non-compliance can far outweigh the cost of simply getting it right.
Cloud services deserve their own line in the budget. Hosted platforms, SaaS subscriptions and cloud storage costs can accumulate quickly – and without an annual review, you may be paying for capacity or licences the business has long since outgrown.
Security is the category most often treated as optional until it becomes urgent. Anti-virus, network monitoring, endpoint protection, patch management and staff awareness training are not an add-on. They are the foundations of a functioning IT environment. 4TC’s managed anti-virus and endpoint protection keep this layer active and current without requiring constant internal attention. It is also worth assessing exposure through dark web monitoring, which can surface compromised credentials before they are used against you.
Backup and recovery is where the difference between planned and unplanned IT becomes most visible. Many businesses assume their data is backed up, then discover otherwise at the worst possible moment. The question is not just whether backups exist, but whether they are tested, where they are stored, and how quickly a recovery would take. 4TC’s managed backup service handles this end-to-end, including direct-to-cloud backup and disaster recovery planning.
IT support costs are where the reactive versus managed services distinction has the sharpest financial effect. Ad hoc support feels cheaper because you only pay when something goes wrong. In practice, emergency rates, extended downtime and the accumulated cost of unresolved background issues make it significantly more expensive across a full year. Managed IT services replace that variability with a predictable monthly cost and a team that understands your environment before a crisis occurs.
There is a version of IT management that looks fiscally disciplined on the surface: keep spending minimal, defer upgrades, and continue with the same arrangements because they have not obviously failed. This is common in businesses where IT rarely gets a seat at the budget table, and it works until it does not.
The cost eventually shows up in the details. An older device fails and takes with it client data that was not properly backed up. A member of staff loses an afternoon to a software conflict that has never been resolved. Neither of these scenarios appears in a budget, but they have a measurable cost in staff time, recovery effort, and damage to client relationships.
Good IT budgeting does not eliminate these risks but instead makes them visible, manageable, and proportionate to what the business can absorb. A company that understands what it spends on IT, why it spends it, and what it is protected against is in a materially stronger position than one that has simply never looked.
The most useful first step is an inventory of what you have. Ask yourself how old your hardware is, what software the business is paying for and who is using it, when your backups were last tested, and whether your operating systems are patched and current across every device.
From that baseline, a forward-looking plan covering the next one to three years becomes achievable. The end goal is a budget that puts you in control of IT spend, rather than the other way round. When technology investment is planned and proportionate, it stops being a source of surprise and starts behaving like any other operational cost.
At 4TC, we work with SMEs across London and beyond on business IT planning and support – building structured, affordable IT environments on both Mac and Windows. If you would like a practical review of your current setup and an honest assessment of what a planned IT strategy could look like for your business, get in touch with us here or call 020 7250 3840.

It starts with a small thing – like a laptop freezing during a client call or someone spending an hour fixing the office printer. Maybe the Wi-Fi drops and nobody knows why. These moments rarely feel urgent enough to act on, but they are the early signs of a deeper problem.
Most businesses don’t set out to mismanage their IT. Someone in the office becomes the unofficial tech person, problems get fixed as they arise, and the assumption takes hold that this approach costs less than paying for outsourced IT support.
But when you look at what DIY IT actually costs in practice, including the business IT risks that build over time, the picture changes.
When something breaks and there is no structured support in place, the first cost is time. Someone has to stop what they are doing and troubleshoot the problem, and that person is rarely an IT specialist.
More often, it’s a senior employee or business owner, someone whose time is better spent on clients, strategy, or revenue-generating work.
Even short periods of disruption add up. IT downtime costs are not limited to the minutes a system is offline. They include:
For most SMEs, these costs never appear on a balance sheet. Instead, they sit in the background, chipping away at productivity week after week.
Picture a typical Monday morning. Your team logs in and gets to work like usual. Except, over the weekend, a critical security patch was released for a vulnerability already being exploited.
Without a structured process, that patch sits uninstalled. Not because anyone made a bad decision, but because nobody was watching. This is exactly how gaps form.
According to the government’s independent research on the economic impact of cyber-attacks, the average cost of a significant cyber-attack for an individual business in the UK is almost £195,000.
For an SME already absorbing the operational fallout, that is a significant and avoidable cost.
Moreover, compliance frameworks like GDPR and Cyber Essentials expect businesses to demonstrate ongoing, reasonable steps to protect data. A reactive approach makes that difficult to evidence, because the work only happens after something has already gone wrong.
Proactive IT support keeps patching on schedule, monitors endpoint protection centrally, and reviews access controls regularly.
One of the less visible business IT risks is what happens to the people who end up carrying the load.
When a team member becomes the default IT contact on top of their actual role, two things happen. Their core work suffers, and they absorb stress that was never part of their job description. Over time, this creates a pattern:
These are not abstract concerns, but for growing businesses, they directly affect the ability to scale efficiently.
Perhaps one of the most significant hidden costs is what your business is not doing while it manages IT reactively. Every hour spent troubleshooting, recovering a lost file, or configuring a new laptop is an hour not spent on client delivery or strategic planning.
Managed IT services shift that balance. Rather than absorbing IT as an unpredictable operational expense, a structured approach turns it into a fixed, plannable investment. You gain access to a team that monitors systems proactively, resolves issues before they escalate, and keeps your infrastructure aligned with your business goals.
This is the financial logic behind outsourced IT support. It is not about spending more on technology. It is about spending more wisely so that the people in your business can focus on the work that drives growth.
A good managed IT services provider, like 4TC, works proactively in the background, keeping systems healthy, secure, and current. That typically includes the following:
The result is fewer surprises, less downtime, and a business that runs on technology rather than around it.
If your current approach to IT involves hoping nothing breaks, it may be worth asking what it is quietly costing your business.
A conversation with 4TC can help you understand where the gaps are and what a structured, proactive approach would look like for your organisation.
Get in touch today to find out how you can make your IT work harder for your business.


Email: support@4tc.co.uk
Tel: 020 7250 3840
5th Floor, 167‑169 Great Portland Street
London
W1W 5PF
Thremhall Park
Start Hill
Bishops Stortford
CM22 7WE

