I’m sure every business owner has had plenty of people calling or sending them information about this “Big switch off”. But, when you’re focussed on survival, you’re not going to be thinking about something taking place in three years’ time. Now it has become a...
There has been recent reports of new ways malware groups are compromising websites to gain access to your machines and networks. When you visit a website compromised in this way it will display an error message similar to below with instructions on how to fix an...
Small businesses are increasingly the target of cyber-attacks! A scary yet true statement. With limited resources and often without a dedicated IT security team, these businesses are prime targets for cybercriminals. Enter Cyber Essentials, a government-backed...
Portable data storage come in several forms including Drives, Memory Sticks and Memory Cards. The Reward: These devices provide a cheap & convenient way to move your data between different computers, networks and locations and are commonly used in most businesses....
You should NEVER use both your email address and email password for a login to any other site or service. this can allow cybercriminals to be able to change the username and passwords of these accounts. Use complex passwords: takemymoney This password...
What is Multi-Factor Authentication? MFA is an additional check(s) that the person who entered the username and password is the actual person who the account belongs to, this means that even if your password falls into the wrong hands unauthorized users can’t...
Don’t Get Caught Out! The switch-off of PSTN analogue connections has been postponed until the end of 2026, but now is the time to transition from outdated analogue connections to modern, faster technologies. Waiting until the last minute could result in disruptions...
You may receive a seemingly innocuous email asking you for information from a known supplier or customer, it may even become a back-and-forth email exchange… with harmless information being exchanged, This is to build trust and familiarity, before requesting...
Browsing the web presents many risks, so due to size this month’s tip will be split over 2 posts, reduce the risks by following the Part 2 steps below: Downloading Files and Applications Downloading files or applications from untrusted sources can introduce malware or...
Browsing the web presents many risks, so due to size this month’s tip will be split over 2 posts, reduce the risks by following the Part 1 steps below: Keep Your Web Browser Up to Date Microsoft Edge: Click on the three-dot menu in the top-right corner, go to...