Everything you need to know about domain hijacking

2020-07-20T17:18:06+00:00July 20th, 2020|Categories: IT Security|Tags: , , , , , , |

Everything you need to know about domain hijacking Every business owner knows the importance of a good domain and anyone who’s tried to find one will know just how hard it can be. Early-adopters have already grabbed many of the best domains, which means that they are now either in use or only [...]

Password managers – do the benefits outweigh the risks?

2020-06-29T13:09:52+00:00June 29th, 2020|Categories: IT Security|Tags: , , , , , |

Password managers - do the benefits outweigh the risks? One of the ironies of our modern, digital lifestyle is that we are continually being urged to use a strong and unique password for every account we have, while also continually being offered the option to have this password saved for us so that we [...]

Could your computer make you sick?

2020-06-26T07:52:27+00:00June 26th, 2020|Categories: IT Support|Tags: , , , |

Could your computer make you sick? According to an old saying, “when America sneezes, the world catches a cold”. What if, however, technology developed to a point where a supercomputer could sneeze and make the world catch a cold? That time may not be so far off. A very brief history of computer viruses [...]

What SMEs need to know about a massive rise in ransomware attacks

2020-06-22T12:12:27+00:00June 22nd, 2020|Categories: IT Security|Tags: , , , , , |

What SMEs need to know about a massive rise in ransomware attacks The Malwarebytes’ Q1 2019 Cybercrime Tactics and Techniques report contains some eye-watering statistics, including the fact Q4 2018 to Q1 2019 saw business ransomware detections increase by no less than 195% and, taken over the course of the year, the increase was [...]

IoT home gadgets to be made more secure

2020-01-02T15:55:53+00:00January 2nd, 2020|Categories: IT Security, Technology Trends|Tags: , , , , |

IoT home gadgets to be made more secure The Internet of Things (IoT) has made our lives more convenient in all kinds of ways but, as anyone involved in security will know all too well, convenience can come at the expense of security. In some contexts, this does not really matter, but when [...]

Pentagon “Do Not Buy” Software List

2019-01-02T17:26:14+00:00January 2nd, 2019|Categories: IT Security|Tags: , , , , , |

Pentagon “Do Not Buy” Software List The trend towards globalised software development may have just taken an interesting new twist. Over recent years, China, India and Russia have all emerged as countries with banks of talented developers available at a lower cost than their counterparts in some other parts of the world, such as [...]

E-forensics: what you need to know

2018-04-09T13:45:44+00:00December 14th, 2017|Categories: IT Security|Tags: , , , , , , |

E-forensics: what you need to know If you reported being mugged to the police, you’d expect to have to provide them with enough information for them to start an investigation. As a minimum, you’d expect to have to tell them where and when the attack took place and what was stolen. The same holds [...]