Blog

Two thirds of remote workers use a faulty device, so they don’t get into trouble

A new report has discovered that 67% of remote workers are using faulty tech when they work remotely. And often that’s because they’ve accidentally damaged the tech themselves… they don’t want to admit it to their boss in case they get into trouble. A company that sells refurbished technology surveyed 2,500 employees. It found that…
Read more

Alert: A clever new type of ransomware attack

It seems like we’re talking about cyber scams a lot at the moment. And now there’s another new trick you need to be aware of. Cyber criminals are smart. They’re forever coming up with new ways to infiltrate your devices and networks to access your valuable data. Fortunately, the defense weapons continue to get stronger…
Read more

Protect your business from these common financial phishing scams

The average office worker sends and receives around 121 emails every day. And while that sounds like a lot, what’s more shocking is that 3 billion phishing emails are sent each day. They account for 1% of all email traffic. What’s a phishing email? It’s an email sent by cyber criminals that pretends to be…
Read more

It’s time to check your business’s defenses against the threat of Russian cyber attack

The Russian invasion of Ukraine could impact your business’s cyber security. There are some checks you need to do to keep your data protected.

Poor battery life may soon be a thing of the past

Microsoft is working on a way to save your battery life. Efficiency mode is being tested and if successful, could save your battery from being drained.

Your business’s Windows updates might be failing because of this one simple thing…

Have you ever wondered why your PC’s operating system doesn’t stay updated? The reason may be this and the fix is easier than you think.

Why You Need Two-Factor Authentication (2FA) To Protect Your Business

You hear about two-factor authentication (2FA), but what is it? How does it protect your business beyond using a password to access things?

What Is Phishing – Then & Now

Phishing is a common way hackers use to get you to do something, like give away information. Here is a brief history of phishing.

How to Protect Your Business Against the Dark Web

The Dark Web. What is it? How does it work? Why should I be concerned about my business showing up on there?

What To Do When You Get This Email

An email stating someone has been watching you is terrifying. Here is how to handle this type of email and how to protect yourself.