by David | Jan 13, 2017 | Blog
It’s been close to 18 months since the arrival of Windows 10. In that time, Microsoft has (deservedly) received endless criticism to the new OS’s approach to user privacy. Not much has changed since the release, with Microsoft sticking to its original policy...
by David | Jan 13, 2017 | Blog
Ransomware has been hitting the cybersecurity headlines throughout the last year, and it shows no sign of slowing down. The latest varients are now targeting a number of remarkable victims, and demanding huge patments to unlock the encrypted data. So what are these...
by David | Jan 9, 2017 | Blog
As the internet has grown, so have the number of incredibly useful services. Some of these services are providing functionality that internal IT departments don’t yet offer, and many employees are setting up accounts with online document sharing sites, CRM...
by David | Jan 9, 2017 | Blog
Your business operates online. Whether it’s just for email, a simple website, or a full-featured application that your customers access, it all relies on connections to the wild-west of the internet. Security vulnerabilities are weaknesses in the system. The...
by David | Dec 15, 2016 | Blog
The latest twist in the ransomware story has come as an unwanted early Christmas present for some. “Popcorn Time” is the latest variant of the file-encrypting malware, but the difference with this one is that it gives an option for those who don’t want to pay the...
by David | Oct 13, 2016 | Blog
What is phishing? It’s a effort to glean sensitive information from a target, often for a malicious reason, such as to enable fraud or unauthorised systems access. Usually the information that is sought contains passwords, or credit card details. It’s...
Recent Comments