All posts by prominentpr

Cybersecurity: 5 top tips to keep your business safe from attack

Cyber-attacks are on the rise. From small businesses to national organisations, hackers have shown little mercy in recent years and are indiscriminate in who they target. Protecting your business is vital.

At SMY IT Services, our team keep up to date on all the latest security developments and work behind the scenes to keep you safe from harm.

Here are five of our top cybersecurity tips on how to keep your business safe.

  1. Use multi-factor authentication

Passwords are a great tool to protect your data, but that doesn’t mean a single layer of protection is enough to stop cybercriminals from gaining access.

Many organisations have been subject to password leaks, with criminals around the world being given an easy way in to steal sensitive information. Those protected by multi-factor authentication (MFA) however, are in a much safer position.

The technology is an increasingly free feature on various software and operating systems, ensuring anyone logging into an account must also have their log-in approved on another device. This could be a confirmatory email sent to your inbox, or a text message sent to your phone.

Every user should have MFA enabled on their accounts, from the bottom to the very top of the business.

  1. Use a password manager

You should use a different password for every account you own. That sounds daunting, doesn’t it? Especially when the average business user has more than 200 to remember.

But it doesn’t have to be that complicated. Password managers such as Roboform and Lastpass not only help generate unique passwords for each of your accounts, they also keep them securely stored using enhanced encryption and MFA.

Password re-use is the most prevalent and dangerous practice around. Don’t let complacency open the door to cybercrime.

  1. Back up your data and update regularly

Backing up your data is a key way of bouncing back fast in the event of a cyber-attack. Your data is often the most important target for cybercriminals out to make a hefty return.

A simple, safe and secure backup system is vital for every business, ensuring a swift recovery solution after any attack.

Our highly secure cloud-based system ensures your business will never lose its priceless and irreplaceable data. What’s more, we also offer additional backup at an off-site, 100% secure data centre.

As part of our services, we ensure software is up to date as outdated software poses a serious cybersecurity risk. By keeping software and operating systems up to date, it ensures the door is not left open to malicious actors.

  1. Don’t forget to secure your mobile devices

It is all well and good protecting your computers and in-house systems, but don’t forget the modern world we live in. Cybersecurity policies should extend to the mobile devices used in your business, from tablets to mobile phones.

When out and about, using a virtual private network (VPN) is recommended when accessing business information via open or public Wi-Fi networks.

Remind your staff of the importance of good cybersecurity practice and ensure they are always acting in a way to keep your business safe when not in the office.

  1. Create a human firewall

Firewalls and anti-malware software are effective tools for bolstering your protection. But an even better way of decreasing the chances of an attack is by training your staff.

Talking through how to spot a phishing email is a great place to start. As is good practice on not clicking links from unknown sources. Cybercrime affects all areas of a business, so it is imperative everyone plays their part in preventing it.

Cybersecurity policies in your business should also be documented to ensure all staff are up to speed.

SMY is here to help

We use the very latest technology to protect our clients from cybersecurity dangers. From thwarting sophisticated attacks to advice on how to spot simple phishing emails, our expert team are here to help.

We can help encrypt your devices – from mobile phones to USB drives – and implement tracking and remote wipe facilities to stop data falling into the wrong hands.

If you need more advice on how to keep your business safe, call our friendly team on 01473 557203.

 

Outsourcing IT Services – The 5 benefits of going external

Why external IT services are good for your business

Outsourcing IT services has become a common practice for businesses of all sizes, and for good reason.

At SMY IT Services, our cost-effective solutions help ensure a trouble-free and secure operation for your business. Our expert team is always on hand to help, no matter your IT needs.

Here are five of the many reasons why going external could be the best move for your business.

Expertise

The IT world is ever changing, with developments in technology often inspiring hackers to try out new tactics. It can be very easy to end up with malware or ransomware on your computer, but they can be very hard to remove.

Here at SMY IT Services we stay on the ball, constantly assessing emerging cybersecurity risks. Don’t let a virus spread and cause a disaster, we’re here to help.

No big investments

Setting up an IT department or keeping them supplied with the latest software and hardware is an expensive task.

By working with SMY IT Services, that cost is greatly reduced. As well as paying monthly for our first-rate expertise and services, you’re paying to be safe in the knowledge there is no extra work or expenditure to worry about.

Take the weight off your shoulders

IT can be a minefield – there’s no denying it. From keeping up with the latest software updates to data management and cybersecurity, the work can quickly pile up.

By working with SMY IT Services, you can focus on your customers, your busy schedule and the work that’s important to you. We’ll handle the computers.

Round the clock support

We know hackers don’t work from 9 to 5. Our team of experts are available around the clock to support your business – monitoring your systems 24/7.

Many out of hours problems can be solved remotely, so there’s usually no need to open up the office.

Free up space in office while keeping data safe

It’s hard to emphasise just how much space an on-site server can take up. Likewise, many assume low-cost cloud storage can meet their data storage needs. In reality, most need a lot more space than they think.

Your data is one of your most valuable assets. Our cloud-based systems back up your files and keep them safe from hackers, power failure, and even bad weather.

Interested?

If you’re looking to outsource your IT services, or are looking at cost-effective IT solutions for your business, give our friendly team a call on 01473 557 203.

 

 

 

Top tips to stay on top of your email security

 

Incoming email display

A crucial factor for any business is email security and here at SMY, the main question clients ask is: is this genuine? Nine times out of ten, if you find yourself asking the question, then it probably is not!

Below are some questions we would encourage you to think about before assuming the email or link is safe.

Are there any inconsistencies?

Firstly, we encourage you to look for inconsistencies within the message. Do you recognise the sender and were you expecting the email? Even if the senders name is one that you recognise, be sure to click on the email address as it can often be similar but not quite right.

You can always pick up the phone to verify the sender is who they say they are; this will usually always give you an immediate answer. You should also check that the FROM address and name match.

Does the email look legitimate?

Another clear sign is the formatting. When hovering over a hyperlink, it should show a reasonably recognised URL. Attachments should be titled in relation to the email content (such as invoice or attendee list) and they should all have standard file extensions such as .pdf or .jpg etc.  There should also always be an email signature with company contact details.

Are you expecting it?

We encourage you to think about whether the content of the email is what you would usually expect from this contact. Is the subject matter something you would usually hear from them on?  Is their tone like previous exchanges?

Are there any errors in the email?

Check if the content is specifically tailored to you and keep an eye out for formatting errors with fonts, sizing, and spelling mistakes.

Malicious links are becoming harder and harder to identify. Once opened or clicked on, your device may be subject to the installation of malware such as viruses. Viruses cause sensitive information to be accessed and shared. Once an email phishing attack has taken place, this can all happen behind the scenes without your knowledge.

If one or more of the above points alarm you, act very cautiously, it is likely to be spam or malicious. If in any doubt, do not open it or any attachments. Contact the sender via telephone to verify the email and\or delete it.

If you need more advice on this topic, don’t hesitate to get in touch with us, our team of experts are always happy to help.

 

One Year of Working from Home

On March 23 2020, a national lockdown was imposed in the UK to help combat coronavirus. A year later, Jonathan Smy from SMY IT Services, takes a moment to reflect on what has been a very challenging 12 months for us all.

It’s been an unprecedented year – a word that has been used time and time again to describe events, but the only one which really captures how extraordinary the effects of the pandemic have been on the minutiae of our everyday lives.

Here at SMY IT, we have experienced both the highs and the lows of lockdown life like everybody else, but despite the challenges it has made us more resilient as a business.

It has also demonstrated how vital our services are to those who have had to make the transition to remote-working and we have taken a lot of pleasure and satisfaction in ensuring our clients have the necessary IT systems and protocols in place to work from home securely.

Most common questions

Working from home has brought up a variety of questions for the SMY team. These are the most common questions we have been asked by people who have been working from home this year – and some suggested solutions:

1. Ever since I started working from home, my internet speed and reliability has been poor. Is this just because my teenagers are constantly on the Xbox?

Yes and no. With millions of people working and learning from home during the pandemic, internet networks were bound to be strained.

Networks are generally accustomed to certain peaks of activity at specific times of the day, such as in the evening when people return from work and get online at home. But our mass change in behaviour meant we were all competing for connectivity all day long.

The problem is home networks — such as the Wi-Fi routers that residents set up — can be a bit unreliable. Many consumers have broadband plans with much lower capacity than in the workplace. And when many people are loaded onto a single Wi-Fi network at the same time to stream movies or to do video conferencing – or play on the Xbox – that can cause congestion and slowness.

Our suggestions would be to turn off other devices in the home that are connected to the Wi-Fi network and make sure everyone in the house is not online at the same time. You can also look at upgrading your package or changing provider.

2. I keep getting shut out of my accounts and forgetting passwords – what can I do to get back into my computer systems?

Forgotten passwords is a problem for lots of people. After all, losing access to your computer files can be a frightening and frustrating experience. And whether you use your computer for personal or business purposes, a lost password can spell disaster for your projects.

Computer manufacturers and software developers alike, are doing everything they can to bolster security and protect user files from intrusion. This is something that we can all be thankful for – until you need to strong-arm your way into your own computer after having lost your password.

If you have found yourself in such a situation, don’t panic. There are password recovery solutions available which we can help you with.

3. My company IT system is not coping with the home working set up. What can I do to make life easier for my employees and myself?

Working from home has forced lots of companies to look more closely at their system performance and, in some cases, overhaul the lot.

Cloud based systems have proved very effective in the last year at managing lots of people working simultaneously on documents and saving files in one easily accessible place.

The beat way to solve this issue is to have a chat with us about your specific requirements. We need to understand how you work and what is good – and bad – about your current set up to suggest a bespoke solution.

4. My computer is painfully slow. What can I do to speed things up?

This is likely to be a problem with poor hardware. Your operating system will have to manage the resources of your computer (memory, drive space, processing power) between all the programs that are running on it.

There is a huge number of things that may be reducing your computer’s performance, but they usually boil down to your computer’s resources being used inefficiently.

Running out of RAM (Random Access Memory) or disk drive space (HDD or SSD) are common problems as is having an old or fragmented hard drive.
Sometimes it’s as simple as having too many background programs or start-up programmes open or you might be due a Windows or driver update.
On top of this you might have a malware or virus issue.

We have a fix for every problem so if this is happening to you, we need a chat to diagnose the problem first.

Our newest recruit

Working remotely has given the team here at SMY IT, the opportunity to review our own in-house processes and work out how we can best serve our clients.

With that has come the need to expand to meet the rising numbers of remote working teams in the region, seeking support to manage their IT systems and processes.

That is why we were delighted to recently recruit a frontline support engineer, Steve Hawley to help us continue to offer a range of services to those businesses in need.

Adapting to remote working life

When the first lockdown occurred, we provided our clients with access to cybersecurity awareness training that they could then pass onto their employees, to prevent the risk of a cyber-attack.

This has added a layer of security to their protocols which has enhanced their ability to adapt to flexible and agile home working.

This continues to be a growing trend in the business landscape, which means we continue to have lots of work to do to maintain remote systems, as this becomes standard practice for some in a post-coronavirus world.

SMY IT is a high-quality IT support, cloud and consultancy provider and offers a range of services. For more information, visit www.smyservices.com or call 01473 557203.

Expansion as businesses continue to seek help

SMY IT Services has expanded with the addition of an extra engineer to support the rising number of home workers in the region.

The company, which offers a range of services to businesses who rely on computer and phone systems, has seen business boom in the last year as more and more people chose to work remotely.

And as a result, it has now recruited Steve Hawley, as a frontline support engineer.

Remote working support

Managing director Jonathan Smy said: “We are thrilled that Steve has joined us.

“His skills are a fantastic addition to the team and our combined expertise will continue to benefit so many of our customers.

“It has been an exceptionally strange year and we are expecting the trend for home working to continue well into 2021.

“Our business has been called upon to make this transition for many companies in and around East Anglia. Many of these now benefit from a smoother and more streamlined operation as a result.

“It’s been a pleasure to help so many to thrive in difficult circumstances.”

Steve Hawley, SMY IT's newest recruit

Steve has more than 20 years’ experience in the IT sector and boasts qualifications in Office 365 and VOIP Telephony.

New recruit

He said: “I started working life in the army but have always been interested in IT. Even while serving, I dabbled and fixed a couple of problems with equipment.

“After I left the army I started as an Avaya telecoms engineer and I learned different skills so that I was able to work on both IT and telecoms.

“I now specialise in telecoms and physical networks.”

SMY IT is a high-quality IT support, cloud and consultancy provider and offers a range of services. For more information, visit www.smyservices.com or call 01473 557203.

What SMEs can learn from high-profile cyber-attacks

Just under half of all cyber-attacks are aimed at small to medium-sized businesses but, the risk isn’t limited to just those organisations. It is a risk that everyone faces, even national and international brands.

This week, budget airline company, EasyJet, fell victim to a cyber-attack. Around nine million people’s travel information and contact details were hacked in the breach along with 2,208 customers’ credit card details.

In a statement, EasyJet clarified to its customers that “issues of security are taken extremely seriously” and customers who have had their credit card details accessed are being contacted.

The news of the cyber-attack came just days after UK Foreign Secretary Dominic Raab highlighted the rise in cyber hackers looking to exploit vulnerabilities and steal valuable information during the coronavirus pandemic.

EasyJet is not the only high-profile organisation to fall victim to such highly sophisticated cyber-attacks. The likes of the NHS, British Airways and cleaning company ISS World have all been at the centre of huge hacks or data breaches. 

What is a cyber-attack?

As defined by the National Cyber Security Centre, cyber-attacks are “malicious attempts to damage, disrupt or gain unauthorised access to computer systems, networks or devices, via cyber means”.

Cyber-attacks can come in many guises. Being aware and taking preventive steps against them are the best ways to protect business from an attack.

What are the different types of cyber-attack?

There are two different categories of cyber-attack; targeted and untargeted. Each category contains different ways that hackers can target an individual or organisation.

Untargeted attacks are not specifically aimed at any one type of person or organisation. They seek out multiple revenues for exploitation. These include:

Phishing – whereby emails are sent out to a large number of people asking for personal data or containing fake links which often contain harmful material

Water holing – compromising a legitimate website or creating a fake one for users in order to exploit them and their personal details

Ransomware – a type of malware which criminals use to gain access to and lock users out of files. Files that have been locked will often be used as leverage for ‘ransom’ to have the files returned

Scanning – searching a large area of the internet randomly to find sites to attack

Targeted attacks are aimed at an individual or organisation that has been singled out and often more thoroughly thought out and damaging. These include:

Spear phishing – similar to phishing however the emails are sent to targeted individuals

DDoS extortion distributed denial of service attacks are attempts to overwhelm a website by supplying it with a large amount of traffic. This typically results in a server crash. Criminals will contact organisations and threaten to subject them to a DDoS

Subverting supply chain – this involves attacks on software or other suppliers that the organisation relies on

How do I protect myself or my organisation from cyber-attacks?

The variety of cyber-attacks and the ways in which hackers operate can be daunting, however you can protect yourself and your organisation. Bigger companies, such as EasyJet, are more at risk from more sophisticated and targeted attacks while SMEs are more likely to fall victim to untargeted attacks. SMEs can protect themselves against these types of attacks by taking preventative measures.

Not all measures to protect yourself from cyber-attacks have to be complex. Simple steps such as having secure passwords and installing security software all go a long way to protecting your computer or devices. Read our blog for six top tips for increasing your computer security.

During COVID-19 we are providing our clients with access to training, including topics such as cyber security, to pass onto their employees. Internal training on matters such as this can reduce the risk of attacks which include a decision made by an employee, for example, opening a scam email or attachment.

In a society where cyber threats are evolving at a rapid pace, the need to keep on top of cyber-security, is vital and even the most experienced computer users can run into issues. If you need advice, feel free to contact us.

Top tips for working from home security

The coronavirus pandemic has changed the working landscape for everyone. Many people are working from home having set up makeshift offices in their dining room.

Working from home

But working from home has its risks. In a Government daily briefing, Foreign Secretary Dominic Raab, highlighted the rise in cyber hackers looking to exploit vulnerabilities in an attempt to steal valuable information.

“Whilst the vast majority of people have come together to defeat coronavirus, there will always be some who seek to exploit a crisis for their own criminal and hostile ends,” he said. “We know that cyber criminals, and other malicious groups are targeting individuals, businesses and other organisations by deploying Covid-19 related scams and phishing emails.

“We are working with the targets of those attacks, with the potential targets and with others to make sure that they are aware of the cyber threat, and that they can take the steps necessary to protect themselves or, at the very least, mitigate the harm that could be brought against them.”

Here are SMY IT Service’s top tips for minimising the threat of a cyber-attack.

1. Secure your Wi-Fi network

When you set up your home Wi-Fi network or receive your free router, did you change the default name and password for the admin console? If it still has the original details, your network is highly vulnerable.
We also recommend you change the network’s name (sometimes referred to as SSID) and password to something unique which will prevent a cybercriminal from accessing your network.
When carrying out sensitive tasks such as online banking, it is safer to connect via your mobile data than using public and free Wi-Fi connections.

2. Provide employees with cybersecurity awareness training

More than 90% of all data breaches are caused by human error due to inadequate training in cybersecurity risks. One wrong click from an employee in a phishing email or fake website can bring down the most robust of IT systems. Therefore, employees should be the greatest security asset and act as a ‘human firewall’ in being the first line of defence in preventing an attack. Those using the system need to understand the risks, what a cyberattack looks like and what they should do in the event of an attack.
Be as wary, if not more so of any email you receive remotely, especially those claiming to be from a manager or the boss where it can be harder to verify its authenticity.

3. Firewalls and antivirus software

Firewalls act as a defence to prevent threats accessing your system. They create a barrier between your device and the internet by closing off ports of communication. A strong antivirus programme acts as the next line of defence by detecting and blocking known malware. Even if malware does find a way onto your device, an antivirus can detect this and usually remove it.

4. Regularly install updates

You might find that regular software updates are a nuisance, but they are vital. Updates often include patches for security vulnerabilities that have been found since the previous software update was installed. The majority of the time, updates can be set to run automatically while you are on a lunch break or overnight.
We suggest checking the status under Settings\Update & Security for Windows or under System Preferences\Software Updates for Apple Mac and install any that are missing.

5. Backup data

Your data is one of your business’ most prized assets, so it is imperative that it is backed up. Data can be lost in several ways including human error, physical damage to hardware or a cyberattack. One of the most convenient and cost-effective ways to store your data is in the cloud. This has the added benefit of allowing you to access your data remotely and on different devices.
Many users often save their files to their desktop of local PC for convenience, however this means that the file is no longer backed up by the server.

6. Lock your device

It sounds very simple, and it is. By using a password on your device, it prevents anyone from accessing the contents. If you have to work in a public space, or if you live with people who you cannot share work information with, it is important to lock your laptop, tablet, or other device when it is left unattended. For Windows users, this would be by pressing the Windows key and L.
It is also advisable to avoid working on computers directly facing windows where people walking on the street can see your screen.

7. Strong and secure passwords

When choosing a password, ensure it is long and complex. We always advise clients to use a passphrase rather than password and for it to contain a mix of upper and lowercase letters, numbers and symbols as well as to change them every few months. You can simplify your computer security by using effective password management. Check out our top tips for a secure password in our World Password Day blog.

8. Device and data encryption

Encryption is a cybersecurity measure that protects computers and their content by basically scrambling the data. The data, whether it is a message, image, email or other file, is converted into an unreadable format. This means that the data is readable only to the person authorised with the physical encryption key, and not cybercriminals.

If you need advice on working from home securely, don’t hesitate to get in touch with us.

Five top tips to protect your personal data 

43% of cyber attacks are aimed at small and medium-sized businesses. With technology continually evolving and cyber criminals rife in our society, it’s important to make sure your valuable personal data is protected. Read our top tips to ensure your personal data is safeguarded.

1. Change the default credentials of your devices

Your passwords and usernames shouldn’t be the same for multiple locations. For example, your Twitter password should be different to your email and banking passwords. Always use a varied combination of passwords for each new login. Complex passwords up to eight characters can still be hacked relatively easily. Instead, try putting a few words, numbers and special characters together. Have a read of our World Password Day blog for further advice

2. Keep on top of software updates

If your device or software has an update, you should always install it. Manufacturers will use their updates to fix any new bugs or security vulnerabilities they have identified. Newer operating systems and software updates are more secure and include features to maintain security.

3. Install anti-virus and keep it up to date

Computers and other devices are all susceptible to cyber-attacks. Having anti-virus is the first line of defence for your device. It will regularly run scans to make sure your device is protected from viruses. Keeping it up to date will ensure it is always working to protect your laptop.

4. Think before you click or open anything

When it comes to your computer, you are the first line of defence. If you see something that appears suspicious, do not open it. You can protect your device from viruses and unwanted scams by being wary of what you click. Hovering over the links in emails and pop ups will give you the chance to check it before you open and, if it seems suspicious, the advice is simple – don’t open it!

5. Have multiple backups of your data

Backing up your data to multiple places will mean it isn’t just stored on one machine. You should have multiple backups that are stored in separate locations and should be automatic to ensure your backup is always up to date. Making sure you regularly test your backups will be peace of mind that your data is stored securely.

Protecting your data and keeping your computer secure are of paramount importance. If you’re looking for the right IT solutions for you, see what SMY IT Services can offer.

Dispelling the myth that computing is for boys

Recent figures have revealed a widening skills gap for the computing industry. Fewer pupils are opting to study for a GCSE in either computing or ICT and there is a growing gender gap, with boys outnumbering girls. Here, our managing director Jonathan Smy, and his niece Chloe Matthews, who is studying computer science at A level, discuss why digital technology is so important.

According to data from the Joint Council for Qualification, a total of 89,452 students studied ICT or computing at GCSE in 2019, compared to a combined total of 130,210 the previous year.

In total, boys accounted for 68,965 exam entries, while just 20,577 girls opted for the computing GCSE.

Digital world

In my opinion, the new computing GCSE is perceived to be, and probably is, much harder than the previous ICT qualification and this is what is deterring students from studying it. And, at a time when there is pressure to perform in core academic subjects such as English, maths and science, maybe students do not want the added pressure of what is perceived to be a difficult subject.

Jonathan Smy

Technology, computers and the digital world is firmly embedded all around us so students should not be discouraged from studying computing. But perhaps they are not fully aware of the extent to which digital technology is rooted in our world? Or that they can pick up studying computing later in life once they their core studies have been achieved.

What students need to understand is that there are numerous strands to computing and how the skills lend themselves to a career. It is important for us as IT experts to explain to students how computing translates into real life. We need to ensure that young people are not put off these subjects at school and are encouraged to see what doors can be unlocked by studying computing.

Breaking the mould

Chloe, 16, has recently chosen to study computer science at A level at Suffolk One, having found various aspects, such as programming and binary, of interest.

She said: “Despite the world around us becoming more digital, I don’t think people my age are fully aware of what a computer science course involves.

“As many people aren’t introduced to computer science before GCSE, their interest is more likely to be on something they already know about. Their original thought is that it’s just programming. They assume you have to be knowledgeable about the subject to be able to do the course.

“However, this isn’t the case and the course is accessible to anyone willing to try – just like any other subject.

“Computer science is not a subject but an insight into how everyday items and situations operate in order to function in society.”

Jonathan Smy with his niece Chloe Matthews
Jonathan and his niece Chloe

Chloe is hoping to have a career in the computer science-based industry and is considering either an apprenticeship or going to university.

Understanding computer science is becoming more important in terms of day to day life – we all know someone who finds it difficult to set up emails on their mobile phone!

Computing touches so many sectors and careers. Even if you do not have a direct career in computing, there are very few jobs that do not require IT knowledge or the use of a computer. Everyone needs to embrace digitisation and value what it can do to improve daily routines.

The IT industry needs more young people to understand how interesting and diverse computing can be. The world really could be their oyster providing they are not afraid to take the plunge and discover the endless possibilities.

SMY IT signs sponsorship deal with East Bergholt Football

A leading Suffolk IT company has given a football club a boost this season after agreeing to be the team’s main sponsor.

SMY IT Services, based just outside of Ipswich, has donated money to East Bergholt Football Club for the sponsorship package over the next two years.

The club’s three senior teams, featuring more than 80 players, have been bought brand new SMY IT branded training tops and home football kits.

East Bergholt Football Club's first team
The first team at East Bergholt Football Club.

Jonathan Smy, managing director of SMY IT Services, said: “We are absolutely delighted to provide this support to East Bergholt Football Club.

“It is important to us to work with our community and East Bergholt Football Club is an integral part of that local community.

“We wish the club the best of luck throughout the 2019/20 season.”

East Bergholt Football Club, which is based at Gandish Road, has three men’s senior teams as well as three ladies’ sides, five junior teams and one mini football session for children aged four to six.

Martin Peck, chairman of East Bergholt Football Club, said: “We are thrilled to have SMY IT Services sign on as the main club sponsor for our senior teams here at East Bergholt.

“Running a non-league football club can be a struggle so we are extremely grateful for the support of SMY IT and our other sponsors for their support.

“It is great to have locally-based businesses wanting to support our club and their generosity will make a huge difference to us.

“Our players have been wearing their new home kit with pride.”

East Bergholt Football Club's second team
The second team at East Bergholt Football Club