Community Defibrillator

ITVET purchases a defibrillator for the wider community

At ITVET, we have invested in a defibrillator for our local community. This will be attached to the outside wall of our Bishop’s Stortford office. Our company was founded with the intention to provide consistent customer satisfaction and to bring a positive impact to our local community. We do this in many ways, from our laptops for schools campaign, our charity work, our client communications, and now with our defibrillator investment. This defibrillator contributes to our objective to provide a positive impact on our wider community.   

What is a defibrillator?

A defibrillator is a life-saving device when a person enters cardiac arrest. Before the arrival of an ambulance, a defibrillator is used to monitor the heart’s rhythm, issuing shocks if needed. The sooner you attach the defibrillator the higher the survival rate. 

Cardiac arrest   

Cardiac arrests can happen to anyone, at any time. Unfortunately, cardiac arrests happen without warning. Preparation is vital for survival. There are over 30,000 cardiac arrests a year in the UK that take place out of hospital.   

A cardiac arrest is when your heart suddenly stops pumping blood. It’s triggered by an electrical malfunction in the heart that causes an irregular heartbeat. Oxygen can’t be transported to the vital organs including the lungs and brain which causes a person to fall unconscious and stop breathing. Immediate treatment is needed in this scenario.  

In the first instance, 999 must be called immediately. Whilst one person performs CPR another should fetch the defibrillator and carefully follows its instructions. The operator on the emergency call will talk you through what to do. 

cardiac arrest vs heart attack

How a defibrillator helps 

 The defibrillator assesses the heart rhythm and tells you when to shock the person if they require it. The purpose of a shock is to reset the electrical system in the heart to help it beat normally again. The shock is a brief electrical current that is sent through the heart. This allows the body’s natural pacemaker to re-establish its rhythm.   

In the UK, less than  2% of cardiac arrest victims have a defibrillator deployed before the ambulance arrives. More defibrillators are desperately required in public places and workspaces to help more people survive.   

Laura McNab, a registered nurse, and the Clinical Educator for Resuscitation Training informs us “providing defibrillation within the first 3-5 minutes of a collapse can produce survival rates of 50-70%. For each minute a person is without access to a defibrillator, chances of survival are greatly reduced.”

It is because of this extremely short time frame that defibrillators need to be sited on a very localised basis. Having to travel far reduces the patient’s chance of survival. Any area with a significant population density will benefit from having a defibrillator. This is why they are sited at schools, libraries, public buildings and health care centres around the UK.  

The defibrillator at ITVET’s head office ensures that if any of our staff or a local member of the community experience a cardiac arrest, they can get help quickly. We want to increase their chance of survival by getting it to them as soon as possible.  

Who can use a defibrillator?

What makes a defibrillator so useful is that it doesn’t need any official training to use. There are clear instructions on how to attach the defibrillator pads. The device tells you through visual and vocal prompts when to deliver a shock if it is needed. This guidance ensures you can’t do any harm to the person in cardiac arrest.

When should you use a defibrillator? 

when to use a defibrillator

These are the main signs of a cardiac arrest that must be acted on immediately. At this point, their heart is no longer pumping blood to their brain and they are in a critical condition.  

A stark reminder of how important defibrillators are 

The world recently watched on in horror as Danish Striker Christian Eriksen collapsed in the middle of a football match with a cardiac arrest. In his Doctor’s words “He was gone.” Having near immediate access to a defibrillator and full medical team undoubtedly saved his life. Since this event, campaigners have renewed their calls for more access to defibrillators.  

The defibrillator is now situated on the outside wall of our central office in Bishop’s Stortford. This investment is part of our corporate responsibility to the wider community of Bishop’s Stortford.  

ITVET's defibrillator located on the office wall

How to improve email security: 8 essential tips

2020 saw the largest ever increase in online fraud, with malicious emails containing harmful links being by far the most successful methods used by criminals. The City of London Police reported that over £19m was lost to scammers in London alone. With these threats growing in volume and complexity daily, it’s vital we understand how to improve email security.

There is no doubt that email remains the most popular, and quickest way to communicate in business. The volume of emails sent globally continues to increase annually. This trend is set to continue despite the growing popularity of instant messaging and collaborative platforms such as Microsoft Teams.

It is now estimated that over 45% of emails sent are spam. This number only accounts for those emails which have been detected by various spam filters, this does not include the high percentage of ‘allowed’ marketing emails that clog up our mailboxes daily. Russia alone accounted for 23.5% of all unsolicited emails in 2020.

Junk mail in Inbox

It is probably easier to look at the emails that are received by your company and determine what percentage is relevant to your business activities. This may surprise you, as it could be less than 30% of all emails received! If you find that figure difficult to believe, have a look through your own inbox. Like most users, the marketing and spam messages will most likely outnumber genuine work-related emails.

Imagine if you could turn off all unwanted emails into your business, and just see those that are relevant. Imagine getting rid of all those distractions, which are often so numerous it makes it easy to miss genuine emails. But best of all, imagine getting rid of the various phishing and scam emails, and making your email system safer and more secure.

While the most up-to-date and stringent email security systems, such as Trend Micros’ Hosted Email Security can mop up a large percentage of dangerous emails, it is virtually impossible to eradicate them completely. There are various reasons for this that don’t point to the security systems themselves. It is largely down to the way they are configured and the way that emails are used by businesses. So, let’s take a quick look at some email security tips.

Email security tips

Sending email with email security system

Email security systems

Initial setup & configuration – It goes without saying that if your company doesn’t already have one, it most definitely should have a dedicated email security system, like the excellent Trend Micro Email Security System (EMS). However, even if you do have email security, it’s vital that it is configured and maintained correctly. From our experience, many cases are rooted in poor setup and configuration, before being neglected by IT teams. It pays to not underestimate how important and complex the initial setup and configuration is. It’s not just a case of point, click, set, forget. Businesses should look to onboard the services of an email security specialist, who really understands the chosen product, and can also provide training to the in-house IT team if required.

The Known Good Senders List (Whitelist) – A crucial part of any email security system, is building and maintaining an accurate list of known email addresses that your company does business with. This is just as important as determining a Bad Senders List (Blacklist). Building a known good senders list will help prevent the email security system from frustratingly blocking potentially wanted emails as spam. However, it’s still possible to receive dangerous or virus-laden threats from known good email addresses. That said, if your email security system is set up correctly, it should block the vast majority of emails that contain malicious attachments or links. Given the speed that cyber threats evolve, even the most stringent system can allow the odd malicious email through. That is where the company’s own email setup and end-user training comes into play. More about that below.

Spam alert on mobile phone

Security filtering levels – Finding the right balance between being overly zealous or allowing too many spam emails through can be difficult. Users find it frustrating when a genuine email gets trapped as junk, but at the same time, the email security system needs to do its job. Again, this is where it pays to have a dedicated specialist who can work with you to strike the right balance. This may take a few weeks following deployment until the correct level is found, and any tweaks made. From a security perspective, however, it is better to have the odd email trapped than to allow too many through. It’s worth pointing out that releasing trapped emails should be a very simple and painless process for the end-user and take no more than a couple of clicks.

The Company Email Setup

Do all employees need email? – This may seem obvious, but if employees do not need or use email other than for internal use, then it’s possible to simply turn off external emails for those users. It is worth keeping in mind that as more and more companies adopt Microsoft Teams even internal email usage is dropping significantly.

Limit emails to approved senders only – If users only send and receive emails to known contacts, then it’s possible to block all emails from unknown senders. It is also possible to add an autoresponder to both the sender and recipient, so they are aware that the email has been blocked by the email security system. This can even be put in place for generic or departmental email addresses such as ‘sales’ or ‘enquiry’ for example. If an email is sent from an unknown sender, an autoresponder can be sent back with a link to the contact form on the company website. Again, an alert can be sent to the recipient to notify them that an email has been blocked, and a copy of the email is available in the email filtering system just in case.

Restrict emails due to content – While it can be frustrating for end-users to have genuine emails trapped in junk, it’s worth rethinking the type of content that is allowed to be delivered into your organisation, even from your approved senders’ list. For example, you could set up a rule to automatically quarantine all emails with attachments or links to shared documents. This would mean end users having to release them from quarantine. Although this does not completely rule out the threat, it does make the end-users stop and think before they knowingly release a quarantined email. Appropriate warnings can also be displayed at the time of releasing emails too.

Employee on laptop practising secure email

End-user training – It is well known that end users are responsible for unknowingly initiating a majority of successful phishing attacks by clicking on links or downloading harmful attachments. End-user training is probably the most important part of any email security system, yet sadly it is hardly ever provided. Most companies rely solely on the security systems and procedures they have in place, but clearly, this isn’t working. We only have to look at the data to establish that threats are increasing at an alarming rate and is only set to get worse. Training end-users not only provides them with the tools to avoid getting scammed but also the education and understanding as to why security is so important. This may help lessen the frustration when they have to release the odd email from the spam filter!

Internet security – The vast majority of phishing or scam emails rely on an active internet connection to be able to initiate an attack or scam, therefore having a sophisticated internet security solution such as ‘Cisco Umbrella’ can be key. If an unsuspecting user should click on a malicious link, there is a very good chance that the corresponding IP address will be flagged as malicious, and the phishing attack will be thwarted.


Although the reliance on email in business may be reducing, there is no doubt that it will continue to play a significant role as a communication tool for the foreseeable future. But given the sheer volume and complexity of attacks, it is essential that we understand how to improve email security and make systems as secure as possible. If you would like to find out more or would like to arrange a free initial consultation, please contact us.