What is G Suite and How does It Help Business?

Business collaboration is the norm, whether everyone is working in the same office space or not. Providing the latest technology for knowledge sharing and communication is critical. G Suite is a cloud-based solution enabling effective collaboration through flexibility, productivity, and…

Stop the Inbox Insanity: 5 Tips for Better Email Management

A staggering 269 billion emails are sent every day. Your business is receiving only a small fraction of those emails. Yet your staff likely feel as if at least 269 of those are coming into their mailbox daily. In fact,…

Don’t Get Hooked By a Whaling Attack

The executives of your company are the big fish in your sea. Yet cybercriminals think of them as whales. In fact, whaling is a new cybersecurity threat targeting the C-suite level. You’ve likely heard of phishing attacks. Phishers use scam…

Computer Cleaning for the New Year

The new year can mean resolutions and promises for a “new you.” One way to start this year feeling more in control is to clean up your computer. Follow these simple steps! Tackle the Inbox We do a lot of…

7 Things You Need to Know About Ransomware

Ransomware is a well-named type of cyberattack. Cybercriminals taking this approach kidnap your data. After accessing your network, they encrypt files and demand payment for the passcode. Here are the top seven things you need to know about this business…

Do You Copy? What Can Go Wrong with BCC

Try to find someone who has not “replied all” when meaning to send to only one individual. It’s embarrassing and can aggravate those people with more emails flooding their box. Another common email gaffe is misusing the CC and BCC…

Don’t Let Crooks Hijack Your Domain

Doing business today you are as likely to give out your website address as your email or phone number. Your Web domain is your business identity on the internet. Don’t risk falling victim to the cyberthreat known as domain hijacking.…

LetMeIn101: How the Bad Guys Get Your Password

Passwords are essential to your cybersafety. You know it, but if you’re like the rest of the digital society, you probably have dozens of them to remember. It’s a lot. So, you might take shortcuts. Taking advantage of your laissez-faire…

What is a Firewall, and Why Does It Matter?

Hearing “firewall” in the context of computing can be confusing. How does a tall, blazing fire separating rescue teams from people trapped apply to computers? Well, imagine the rescue team using heavy blasts of water to save the day. A…

What Happens to Your Data When You Die?

Death is a morbid topic most of us try to avoid. Making a will and saying we prefer cremation is the extent of our advance planning. Yet, you may want to also think about what’s going to happen to your…

TalkTalk Help – Urgent!. If you are a TalkTalk customer please read!

This is NOT A HOAX.  Please share. Website attack affecting our customers 3:30pm – 24/10/2015 – Latest Update The investigations by TalkTalk and the Metropolitan Police Cyber Crime Unit into the cyber attack continue.  We can confirm that the latest update of…

How Can I Spot A Fake E mail?

How Can I Spot A Fake E mail? Do you know how to spot a phony request in an e mail? You may  receive an e-mail, for example, from the NY Times to do a survey.  How can you be…

Spam, Spam and more Spam

How often do you check your Spam or Junk E-Mail Folder? We were recently waiting for an important email which had accidently being caught and moved to our spam folder. While most of the email was spam, the email we…

Don’t Be a Phishing Victim: 3 Sure Signs an E-Mail is Fake

Anyone who has been online more than a few years has likely been the victim of a phishing attack. What starts as a seemingly legitimate e-mail requesting information from a user can lead to account infiltration, e-mails sent to that…

Email from FedEx regarding Delivery Problem

For a number of years there has being a fake FedEx being emailed which has an attachment which is normally a virus, as an exe file (or program file) which when downloaded can cause harm to your computer. This is…

Email Addresses

We see many companies who are using a free (Yahoo!, Hotmail or GMail) email address or the one provided by an ISP (Internet Service Provider; such as BT Internet, Sky, AOL plus many more). This may seem a good idea…

Phishing Email from Vodafone

While checking my email I noticed an email from Vodafone, which had the subject heading ‘Importance Notice About Your Vodafone Account’. On checking the message I discovered it to be a phishing attack. I first suspected this due to the…

Sky Email Changes

Do you have a Sky Email Address? Well things are changing. Sky has recently teamed up with Yahoo! to provide the Sky Email Service. They are currently using Google Apps to provide email, but from April 2013 Yahoo! will be…