Testimonials
Customer Service
IT Support
01234 300099

Featured Article : Christmas Cons

In this article, we take a look at some of the latest known online scams so that you can avoid falling foul of cybercriminals this Christmas. Christmas – A Great Opportunity For Scammers The extra spending at many different online shops, often for large amounts, and the requirement for delivery before the big day makes Christmas the ideal time…

Read More

Tech Insight : What Is ‘Surveillance for Hire’?

After Meta (Facebook) recently reported alerting 50,000 people that it believed were being targeted by “surveillance-for-hire” entities, we take a look are who these entities are and what they do. Meta’s Report Following months of investigation, Meta recently informed 50,000 people that they were being targeted by seven “surveillance-for-hire” entities / “cyber mercenaries” who were targeting people in over 100 countries on…

Read More

Featured Article : What’s All the Fuss About Julian Assange?

In this article, we take a look at some of the main details of the case of WikiLeaks and Julian Assange, and what can be learned from this ongoing battle between Assange and the US government, whose secrets his website shared. Who Is Julian Assange? Julian Assange is 50-year-old Australian editor, publisher and activist who founded WikiLeaks in 2006….

Read More

Tech Insight : What Is A Password Manager?

In this tech insight, we look at challenges to using passwords, what password managers are, and why they are still so important. The Limitations and Challenge of Passwords Passwords have long provided a practical way to log in to websites, platforms, apps and other access gateways yet using passwords comes with many limitations and challenges, most of which are…

Read More

Tech Insight : Email Security

In this tech insight, we take a look at the many threats to email security that businesses face and what businesses can do to mitigate them, together with what help is available to help tackle those threats effectively. Email Accounts For Most Security Breaches Prioritising email security is important because most cyber-security breaches involve email, with social engineering a…

Read More

Featured Article : Pesky Pop-Ups!

In this article, we look at some of the pop-ups that users find most annoying, some of the issues around them, and how users can minimise the annoyance and interruption from them. Pop Up Ads Pop-up (adverts) refer to online advertising that takes the form of an interruptive graphical user interface display area that suddenly appears in the foreground…

Read More

Tech Insight : WAP … WEP … What ???

Security Malware Ransomware

In this tech insight, we take a brief look at the WEP and WAP security protocols, and what happened to them. What Is WAP? Developed by Ericsson, Motorola, Nokia, and Unwired Planet, and introduced back in 1999, Wireless Application Protocol (WAP) was a security standard for devices with a wireless Internet connection on a mobile network. It was designed…

Read More