Can mobile phones get viruses?

2020-06-24T17:35:38+00:00June 24th, 2020|Categories: IT Security|Tags: , , , , |

Can mobile phones get viruses? Mobile devices are one of the greatest conveniences of the 21st century but, as anyone familiar with security will know, convenience and security do not always go hand in hand. While they may, technically speaking, be largely resistant to viruses (malware that can replicate itself), they are very much [...]

Universities shown to be excellent places to go phishing

2020-06-22T11:48:06+00:00June 22nd, 2020|Categories: IT Security|Tags: , , , , , |

Universities shown to be excellent places to go phishing The UK is famous for the quality of its universities, which attract undergraduates, postgraduates and academics from around the world. It would appear, however, that when it comes to IT security, some of the staff at these institutions may not be as well-informed as you [...]

Is the Krack attack back?

2019-02-13T12:35:40+00:00February 13th, 2019|Categories: IT Security, IT Support|Tags: , , , , |

Is the Krack attack back? WiFi may be one of the greatest conveniences of the 21st century but, as is often the case, with great convenience comes security implications. The dangers of using public WiFi have long been public knowledge, but there have also been concerns about the danger of the WiFi protocol itself. [...]

What to do when your computer systems are hacked

2018-12-24T09:09:38+00:00December 24th, 2018|Categories: IT Security|Tags: , , , |

What to do when your computer systems are hacked Even with the best security in the world, you have to accept that there is a risk of your computer systems being hacked, and this means you need to think about what to do if this does happen. Hackers are relentless in their pursuit of [...]

How to get rid of a computer virus

2020-01-02T16:14:36+00:00June 14th, 2018|Categories: How To|Tags: , , , , , |

How to get rid of a computer virus Picture the scene: you’re slowly sipping your morning coffee, letting the caffeine percolate as you wind yourself up to deal with the day’s work ahead of you. Then, your phone rings. It’s your tech support guy. You take the call and his first words are: [...]

It’s people, not viruses, who threaten your cyber security

2018-06-08T09:13:04+00:00June 8th, 2018|Categories: IT Security|Tags: , , , , , , , |

It’s people, not viruses, who threaten your cyber security If Hollywood represented reality, cyber security threats would come from super-sophisticated computer geniuses working for super-villains, plotting the destruction of the world as we know it. In actual fact, the biggest threat companies face probably comes from inside their organisation and may come in the [...]

State-controlled hardware and hackers: how safe is the UK’s infrastructure?

2018-05-02T11:17:48+00:00May 2nd, 2018|Categories: IT Security|Tags: , , , , , |

State-controlled hardware and hackers: how safe is the UK’s infrastructure? Cyber attacks are nothing new and it’s been many years since they moved out of the realm of science fiction and into the reality of the everyday world. Up until this point, cyber attacks have largely been attributed (officially at least) to cybercriminals, acting [...]

Infrastructure firms face tough fines for slack security

2018-03-23T12:30:29+00:00March 19th, 2018|Categories: IT Security|Tags: , , , , |

Infrastructure firms face tough fines for slack security The idea of crippling a location by attacking its infrastructure is nothing new. In fact, it’s been going on in one way or another for thousands of years, but up until relatively recently, you had to be physically close by to do it. Over recent decades, [...]

Security and your iPhone

2018-03-23T12:33:25+00:00February 15th, 2018|Categories: IT Security|Tags: , , , , |

Security and your iPhone Smartphone security is increasingly in the news and, as we use our phones and tablets to store a vast amount of personal information and professional data, it is always wise to protect them with a ‘belt and braces’ approach. Assuming that the generic settings on your device will be sufficient [...]

Cyber security and health organisations

2018-04-09T13:48:36+00:00November 30th, 2017|Categories: IT Security|Tags: , , , , , , |

Cyber security and health organisations Back in May, the WannaCry virus must have left many in the NHS wanting to cry. The irony is that it has now become clear that the disruption could have been prevented had the NHS simply followed basic security measures. Outdated security made the NHS an easy [...]

Load More Posts