Stop! And think, before you act on that email
Don’t fall victim to cyber criminals. We explain what a BEC attack is and how to protect your business.
Stop! And think, before you act on that email Read More »
Don’t fall victim to cyber criminals. We explain what a BEC attack is and how to protect your business.
Stop! And think, before you act on that email Read More »
Old computers and external drives can put your sensitive business data at risk.
We look at how to dispose of old computers and external drives in the safest way possible.
Is your business data at risk? Don’t take chances with old tech Read More »
Have you ever received a notification on your phone while you’re sleeping, asking if it’s really you logging in?
It’s called a fatigue attack and Microsoft Authenticator’s latest feature will help to protect you.
Here’s how cyber criminals try to hack your accounts while you sleep Read More »
Microsoft has announced there will be no new feature updates for Windows 10 so maybe it’s time to upgrade to Windows 11. Our latest video will help you make up your mind.
The final curtain call for Windows 10: What you need to know Read More »
Microsoft has just announced an option for people to trial new features before their general release in Windows 11. This isn’t about fixes to security flaws – everyone gets those at the same time. This is an opportunity for businesses to jump the queue to receive new features and updates first. Sound exciting? Yes! Worth the risk? Not quite. Our …
Read More
Windows 11 optional update: Why it’s better to wait Read More »
Cloud computing has quickly become a popular option for businesses that want to streamline their operations, reduce costs, and become more flexible. But are you swayed by the idea that cloud services are automatically better for the environment? Could the need to do your bit ‘cloud’ your decision-making? Sorry. Bad pun. It’s true that cloud services have environmental benefits compared …
Read More
Can your business go green by switching to the cloud? Read More »
Airports, hotels, cafés, even shopping centres, offer public charging points where you can boost your phone or laptop battery on the go. They’ve been in the news after the FBI recently tweeted advice to stop using them. Crooks have figured out how to hijack USB ports to install malware and monitoring software onto devices as they charge. The security risk …
Read More
Charging in public places? Watch out for “juice jacking” Read More »
LinkedIn is introducing new verification features over the coming months to help tackle fake accounts. The business-focused social platform is a fantastic place to connect with like-minded businesspeople, and to find new employees, jobs and opportunities. But thanks to this popularity, we’re seeing an increase in fake profiles, created by scammers for more sinister purposes. Bot-like accounts have been cropping …
Read More
LinkedIn takes action to tackle fake accounts Read More »
If productivity tools aren’t embedded properly within your business, tasks can actually end up taking longer than they should.
Are your productivity tools actually slowing you down? Read More »
Bot malware is a worrying new security risk. Malware bots steal whole user profiles – that’s a complete snapshot of your ID and settings.
Bot malware is a growing security threat Read More »
Our phones are a goldmine of private information. If they’re not as secure your other devices, they can become a gaping hole in your cyber security
Don’t forget your phone when you think about cyber security Read More »