Welcome to Our News Posts
Our top picks of news from the Tech World
What is Petya? How to Protect Against Ransomware?
What is Petya? Petya ransomware is part of a new wave of ransomware attacks that has hit computer servers all across Europe, particularly in the Ukraine and Russia. It is hijacking computer data, infecting and encrypting all the user’s files and displaying messages...
What is MDM?… Why do we need it? – Mobile Device Management Explained
What is MDM? - Mobile Device Management? Keep Your Employees Happy (And Your Data Secure) Smartphones and tablets continue to flood the workplace, and businesses everywhere are racing to appropriately regulate and manage these mobile devices. To support today’s...
3 Microsoft Office Tips You Never Knew You Needed
3 Microsoft Office Tips You Never Knew You Needed... 1. Edit PDFs Your PDF files open by default in Adobe. But, what if you want to edit them? You cannot do that within Adobe Reader, and the Adobe software that does let you make changes to PDFs is not cheap. Microsoft...
30% of recipients open phishing messages!!
Wow - 30% of recipients open phishing messages... and 12% open malicious attachments! With these stats, it's no wonder that two-thirds of cyber threats can be traced to phishing attacks!..... but, what is a phishing attack? Read on as we look into this:...
10 Hidden IT Risks That Might Threaten Your Business
Your business depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it’s probably impossible to imagine your business without IT. Today, computing technology plays a vital role in the way you serve,...
Which Anti-Virus do you use?
Chances are, you're running one of the below.... It's widly accepted that Anti-Virus is a sensible thing to have. It protects your computer by compairing your documents to a database of problem documents. If there is a match, it's likely you've got a virus. This...
What is on your laptop?
Everybody knows that laptop computers, tablets and smartphones get stolen, and anyone reading this probably owns at least one of these digital devices, so should you be concerned about yours being pinched, pilfered, peculated, purloined, or in other words, stolen?...
Ransomware Publish Files Online
Ransomware hackers are changing their tact. What could be worse than losing your files???.... Having them published on the internet if you don’t pay up!! Since it began to take root as far back as 1989, “ransomware” has followed a predictable pattern. Someone infects...
Ransomware – What are you doing about it?
Ransomware is a type of malware that, once downloaded, encrypts your files and makes it impossible to access your own network. You’ll have to pay the hacker a hefty ransom to regain access to your own files and network. A school district in South Carolina recently...
Data Breach – ICO
It's a hot topic; Data Protection #Security, #Protection, #Sensitive data, #Data breach. Almost on a daily basis a big company reveals a huge data breach. Information has been leaked onto the web and people suffer when private information is made public. Yahoo, Talk...
GDPR Facts
Some Facts About GDPR With data breaches in the news on a weekly basis the whole of data protection has been given a much higher priority by UK businesses. Regardless of Brexit, by 2018 new data protection regulations will come into force for the UK, and for all...
Business Email
Two incredible statistics: 80% of small businesses do not use a true business email address. Instead of using an email address sent from the company’s domain name “@yourdomain.com,” most small businesses send and receive emails from domains like “@gmail.com” or...
Recent Comments