What to do when your computer systems are hacked

2018-12-24T09:09:38+00:00December 24th, 2018|Categories: IT Security|Tags: , , , |

What to do when your computer systems are hacked Even with the best security in the world, you have to accept that there is a risk of your computer systems being hacked, and this means you need to think about what to do if this does happen. Hackers are relentless in their pursuit of [...]

Protecting your cryptocurrency investments

2018-07-17T14:08:51+00:00July 17th, 2018|Categories: Technology Trends|Tags: , , , , , |

Protecting your cryptocurrency investments Cryptocurrencies are unfortunately not immune from theft, as was recently demonstrated when cyberthieves stole about £28M of cryptocurrency from the South Korean exchange, Coinrail. The price of Bitcoin plummeted in response, and it has left people asking what they can do to secure their cryptocurrency investments. Many cryptocurrencies operate outside [...]

Cyber security innovation is overdue. What’s on the cards?

2018-06-08T10:06:50+00:00June 8th, 2018|Categories: IT Security|Tags: , , , , |

Cybersecurity innovation is overdue. What’s on the cards? It’s not like the IT industry hasn’t tried, particularly the payment industry. Think back over the last 40 years or so (since IT began to go truly mainstream) and it’s easy to see that the IT industry, as a whole, has put a lot of effort [...]

It’s people, not viruses, who threaten your cyber security

2018-06-08T09:13:04+00:00June 8th, 2018|Categories: IT Security|Tags: , , , , , , , |

It’s people, not viruses, who threaten your cyber security If Hollywood represented reality, cyber security threats would come from super-sophisticated computer geniuses working for super-villains, plotting the destruction of the world as we know it. In actual fact, the biggest threat companies face probably comes from inside their organisation and may come in the [...]

Cybersecurity spring cleaning you should do

2018-06-07T14:01:39+00:00June 7th, 2018|Categories: IT Security|Tags: , , , , , , , , |

Cybersecurity spring cleaning you should do Even though it really doesn’t look like it right now, it is, technically at least, spring. As everyone knows, then, that means it’s time for some annual deep cleaning. It’s good practice to extend your spring cleaning to your digital devices and, this year, there’s an extra [...]

Security and your iPhone

2018-03-23T12:33:25+00:00February 15th, 2018|Categories: IT Security|Tags: , , , , |

Security and your iPhone Smartphone security is increasingly in the news and, as we use our phones and tablets to store a vast amount of personal information and professional data, it is always wise to protect them with a ‘belt and braces’ approach. Assuming that the generic settings on your device will be sufficient [...]

Security and your Android phone

2018-04-09T13:41:10+00:00January 22nd, 2018|Categories: IT Security|Tags: , , , , , |

Security and your Android phone As our mobile devices are integral to our daily lives, the thought of leaving our phone on a train or having it stolen from our handbag is horrifying to most people. As well as the hassle of having to get a crime number and report it to our [...]

Password Alert! Are you at risk?

2018-01-04T14:53:02+00:00August 22nd, 2017|Categories: IT Security|Tags: , , , , , , , |

Password Alert! Are you at risk? Are you guilty of using an over-simplified password that a dedicated hacker could uncover as quickly as you can say ‘internet security’? This website lets you test your password and will tell you how long it would take a computer to break into your account. If you find [...]