Testimonials
Customer Service
IT Support
01234 300099

Featured Article : Study Shows No-One Is Immune From Phishing

Study Shows No-One Is Immune From Phishing

A new report from F-Secure has revealed that the most technically competent staff are just as likely (if not more likely) to fail a phishing test exercise. Phishing Phishing attacks typically involve sending emails that appear to come from a legitimate company/organisation (e.g., a bank) in order to gain an individual’s confidence, so that the recipient will follow a…

Read More

Tech Insight : How to Avoid Being “Doxxed”

How to Avoid Being "Doxxed"

In this article, we look at what doxxing is, some examples of doxxing, and what can be done to protect ourselves and our businesses from being ‘Doxxed’. What Is Doxxing? Doxing is a 90s hacker term meaning for dropping (personal) dox where ‘dox’ is a slang term for documents. Doxxing is a malicious act where a person/persons use a…

Read More

Tech News : Google Changes Stance Over Legacy G Suite Account

Google Changes Stance Over Legacy G Suite Account

Google has offered new alternative options to free Legacy G Suite account holders who it had previously said would have to upgrade to a paid subscription by 1 July. What Is A Legacy G Suite Account? Google’s free edition of G Suite, known as Workspace, was first made available to businesses, organisations, and schools from 2006 to December 6,…

Read More

Security Stop-Press : Businesses Warned To Prepare For Threats From Russia

Security Stop Press : Backdoors Discovered In Dozens Of WordPress Themes And Plugins

A leaked bulletin from the US Department of Homeland Security (DHS) has warned that, in light of the situation on Ukraine’s border, destructive cyber-attacks from Russia-backed advanced persistent threat (APT) actors look likely to be launched soon. The Russian state is thought to have been behind a massive cyber-attack that targeted 70 Ukrainian government websites, and the National Cyber…

Read More

Sustainability : Removing CO2 Via Direct Air Capture Technology

Removing CO2 Via Direct Air Capture Technology

With some climate commentators suggesting that current action and targets to reduce global warming may not be enough, we look at how Direct Air Capture Technology (DAC) could help. The Challenges The world’s governments have set targets to reduce the amount of CO2 produced by human activities in order to at least slow and, hopefully, make headway in trying reverse…

Read More

Tech News : UK Government ‘Help to Grow’ Scheme : Software And Free Business Advice

UK Government ‘Help to Grow’ Scheme : Software And Free Business Advice

The UK government has just announced the launch of its ‘Help to Grow’ digital scheme which offers discounted software and free advice to small businesses. Applications Open Now The Help to Grow scheme is designed to support smaller businesses in adopting digital technologies to help them to grow. Applications for the scheme opened on 20 January. Free Advice and…

Read More

Tech Insight : What Is A ‘Watering Hole’ Attack?

Tech Insight : What Is A 'Watering Hole' Attack?

In this tech insight, we look at what a watering hole attack is, some examples of such attacks, and how businesses can defend against this threat. Poisoning The Water A watering hole attack is a targeted, ‘supply chain,’ cyber-attack strategy, similar to spear phishing. With this strategy, the attacker identifies a website that’s frequented by users of a targeted…

Read More

Security Stop Press : Backdoors Discovered In Dozens Of WordPress Themes And Plugins

Security Stop Press : Backdoors Discovered In Dozens Of WordPress Themes And Plugins

It has been reported that 40 themes and 53 plugins belonging to AccessPress Themes, a Nepal-based company were backdoored with malicious code in the first half of September 2021. It is believed that the infected extensions gave attackers full access to sites, and that access also appears to have been sold to operators of spam campaigns. Site owners who…

Read More