
September 17th, 2020
Getting the Most out of Microsoft 365 – Book it!
Accountants, dog groomers, and physiotherapists didn’t get into business to manage bookings. You want to be working on the thing you enjoy doing, not fussing with phone calls and emails, trying to schedule times for clients to come in. That’s…

September 8th, 2020
6 Reasons to Replace Your ISP Email
When you sign up for an internet service, the provider will hook you up with an email address, too. Your internet service provider (ISP) wants to keep you connected to them. But this convenient email address isn’t always the best…

July 9th, 2020
3 Cyberattackers Putting Business at Risk
Cyberattacks and data breaches happen worldwide, and no one is immune. Your business needs to protect its networks and systems, and secure sensitive data. But how much do you know about the types of cybercriminal out there? This roundup discusses…

July 7th, 2020
Your Webcam Could Be Spying On You
In the midst of a global lockdown, many of us have been relying on webcams to stay connected. These cameras let us join virtual meetings for work and online hangouts with friends. But bad actors can also use a webcam…

June 30th, 2020
Don’t Fall Victim to Webcam Blackmail
Many users have reported recent scam messages from individuals claiming to have intercepted their username and password. These messages often state they have been watching your screen activity and webcam while you have been unaware. Typically, attackers threaten to broadcast…

April 30th, 2020
Has Your Email Been Hijacked?
A common complaint by many users in recent months has been spam emails appearing to come from their own accounts. Despite not knowing why, reports of friends, family, and contacts receiving spam email that appears to come from them has…

February 13th, 2020
What is G Suite and How does It Help Business?
Business collaboration is the norm, whether everyone is working in the same office space or not. Providing the latest technology for knowledge sharing and communication is critical. G Suite is a cloud-based solution enabling effective collaboration through flexibility, productivity, and…

January 30th, 2020
Stop the Inbox Insanity: 5 Tips for Better Email Management
A staggering 269 billion emails are sent every day. Your business is receiving only a small fraction of those emails. Yet your staff likely feel as if at least 269 of those are coming into their mailbox daily. In fact,…

January 23rd, 2020
Don’t Get Hooked By a Whaling Attack
The executives of your company are the big fish in your sea. Yet cybercriminals think of them as whales. In fact, whaling is a new cybersecurity threat targeting the C-suite level. You’ve likely heard of phishing attacks. Phishers use scam…

January 9th, 2020
Computer Cleaning for the New Year
The new year can mean resolutions and promises for a “new you.” One way to start this year feeling more in control is to clean up your computer. Follow these simple steps! Tackle the Inbox We do a lot of…

December 26th, 2019
7 Things You Need to Know About Ransomware
Ransomware is a well-named type of cyberattack. Cybercriminals taking this approach kidnap your data. After accessing your network, they encrypt files and demand payment for the passcode. Here are the top seven things you need to know about this business…

December 24th, 2019
Do You Copy? What Can Go Wrong with BCC
Try to find someone who has not “replied all” when meaning to send to only one individual. It’s embarrassing and can aggravate those people with more emails flooding their box. Another common email gaffe is misusing the CC and BCC…

December 19th, 2019
Don’t Let Crooks Hijack Your Domain
Doing business today you are as likely to give out your website address as your email or phone number. Your Web domain is your business identity on the internet. Don’t risk falling victim to the cyberthreat known as domain hijacking.…

November 26th, 2019
LetMeIn101: How the Bad Guys Get Your Password
Passwords are essential to your cybersafety. You know it, but if you’re like the rest of the digital society, you probably have dozens of them to remember. It’s a lot. So, you might take shortcuts. Taking advantage of your laissez-faire…

November 7th, 2019
What is a Firewall, and Why Does It Matter?
Hearing “firewall” in the context of computing can be confusing. How does a tall, blazing fire separating rescue teams from people trapped apply to computers? Well, imagine the rescue team using heavy blasts of water to save the day. A…

October 29th, 2019
What Happens to Your Data When You Die?
Death is a morbid topic most of us try to avoid. Making a will and saying we prefer cremation is the extent of our advance planning. Yet, you may want to also think about what’s going to happen to your…

October 23rd, 2015
TalkTalk Help – Urgent!. If you are a TalkTalk customer please read!
This is NOT A HOAX. Please share. Website attack affecting our customers 3:30pm – 24/10/2015 – Latest Update The investigations by TalkTalk and the Metropolitan Police Cyber Crime Unit into the cyber attack continue. We can confirm that the latest update of…

May 11th, 2015
How Can I Spot A Fake E mail?
How Can I Spot A Fake E mail? Do you know how to spot a phony request in an e mail? You may receive an e-mail, for example, from the NY Times to do a survey. How can you be…