Security or Flexibility: Which Matters More?

Business is all about making tough choices. One such choice is whether to value IT security or business flexibility more. Unfortunately, you can’t have the best of both at once. While having absolute security or flexibility may sound good, neither…

The Trouble with Trusting Your Online Friends

Trust is the foundation of a good relationship – you trust friends to be loyal, sincere, and honest. But when you blindly trust online friends and people through social media, you could be opening yourself up to cyberattack. When you…

What is a Firewall, and Why Does It Matter?

Hearing “firewall” in the context of computing can be confusing. How does a tall, blazing fire separating rescue teams from people trapped apply to computers? Well, imagine the rescue team using heavy blasts of water to save the day. A…

Why Your Business Needs Managed Services Security

Locking your front door after a burglar has already ransacked your house doesn’t do much, and the same is true of cybersecurity. With the help of a managed service provider, you can stay ahead of security threats with well-tested, leading-edge…

What Happens to Your Data When You Die?

Death is a morbid topic most of us try to avoid. Making a will and saying we prefer cremation is the extent of our advance planning. Yet, you may want to also think about what’s going to happen to your…

Do Macs Get Viruses?

Many Apple owners believe their Macintosh computers are immune to viruses. Apple itself has run ad campaigns promising its computers “don’t get viruses”. And those who have owned a Mac for years, decades even, are particularly prone to believing. After…

Handle with Care: Sending Data Securely

In our digital economy, we send and receive information quickly online. The Internet offers immediate communication with colleagues, clients, vendors, and other strategic partners. Yet we shouldn’t prioritize convenience over data security. What data do you send in a day’s…

Island Hopping: Not Always a Good Thing

The phrase “island hopping” conjures up positive images. You might think of cruising beautiful sandy beaches on a tour of tropical islands. Too bad cybercriminals have given the term a new, less pleasant spin. Island hopping is an increasingly popular…

Locking Up Cybersecurity with a Managed Services Provider

Cybercrime is not the most costly of illegal activities. That dubious distinction goes to government corruption, followed by drug trafficking. Cybercrime comes in third. Yet cybercrime does take the top spot when it comes to numbers of victims. A managed…

Security Patches — The Better Way to Update

Updates often come at the worst moment. You go to shut down your laptop to rush to a meeting, and you get a “Windows is updating. Do not power off” message. Argh! Or you leave your desktop to go to…

Why You Need Professional Virus Removal

“Your computer has a virus.” Such a dreaded five words! We don’t want to come down with a human virus; we’ll feel awful and miss work. But when a virus hits our computer, we could lose valuable information or be…

Android Virus

Over the last few months we have seen a large jump in the number of viruses attacking Android phones and tablets.  Below is an example of  a virus. We strongly recommend that you run on the latest version of Android…

TalkTalk Help – Urgent!. If you are a TalkTalk customer please read!

This is NOT A HOAX.  Please share. Website attack affecting our customers 3:30pm – 24/10/2015 – Latest Update The investigations by TalkTalk and the Metropolitan Police Cyber Crime Unit into the cyber attack continue.  We can confirm that the latest update of…

Computer Backup

Stop for a moment and think what you have got saved on your computer or laptop. Precious photos, work documents, files full of important information; the list goes on. Now think how you would feel if your hard drive was…

Why You Should Not Move Your Laptop

Laptops. They’re designed to be portable. But, did you know that by moving your laptop around while it is turned on can be bad news for your device? In the main, it’s definitely a bad idea to carry your laptop…

How Can I Spot A Fake E mail?

How Can I Spot A Fake E mail? Do you know how to spot a phony request in an e mail? You may  receive an e-mail, for example, from the NY Times to do a survey.  How can you be…

Where Did That Come From? Unwanted programs

Have you ever opened up your browser, and all of the sudden your home page is different or there is a toolbar at the top you don’t recognize or maybe new desktop items? You probably recently installed some new program,…

Quiz Time

Let’s say you want to download the excellent program CCleaner. To remove temporary files from your computer. Can you tell from this screenshot, which is the RIGHT download button, and which ones are ads? It’s pretty difficult isn’t it? This…