How To Reduce Your Risk When You Lose Your Mobile Device?

What You Should Do to Reduce Risk When Your Mobile Device Goes Missing

Few things invoke panic like a missing laptop, smartphone or tablet. People rely on these devices and they can also contain files, personal financials, apps, passwords, pictures, videos and much more. Continue reading

6 Discontinued Tech Tools You Shouldn’t Be Using

Discontinued Tech Tools

The one constant thing about technology is that it changes rapidly! Things that were once shiny and new can now be ancient and obsolete. New versions replace those old obsolete tools and the continued use of old technology can leave computers and networks vulnerable to attack. Continue reading

Changing Your Email Address?

Changing your email address is never fun, but in certain circumstances it is a necessary evil. If you ever need to make a change, there are several things you need to consider. Follow this checklist to ensure you don’t lose data, keep up with your old contacts, and avoid security risks. Continue reading

What Is Smishing?

What Is Smishing

You probably now receive a lot more text messages today from companies that you did a few years ago. This is due to businesses trying to bypass full inboxes. Retailers have joined the trend and are urging customers to sign up for shipping alerts via SMS. The medical industry has also joined the trend with doctors and dentists sending out SMS appointment reminders. Continue reading

Laptop Battery Saving Tricks

Laptop Battery Tips

One of the big positives of laptops is that you can use them anywhere as they don’t need to be constantly plugged in. When you first buy the laptop, it will have a good battery life, but as the years go by that lifespan will get shorter. This can be due to a lack of PC maintenance or the type of environments the laptop is subject to (ie extreme heat and cold). Continue reading

What form of MFA Is The Best?

2FA / MFA Issues

With a lot of business processes now largely cloud-based, compromised passwords are the quickest and easiest way for bad guys to exploit computer systems. So how can you protect your online and offline accounts and data? The best way is with multi-factor authentication (MFA). See our blog article on Why Multi-Factor Authentication is Important.  Continue reading

Help, I dropped my laptop! – What now?

Laptop damaged

Dropping your laptop is never a good thing but it does not always lead to serious damage as it will depend on the following factors:

  • how hard and far it fell;
  • whether it was running at the time of the fall;
  • what kind of surface it fell onto;
  • the type and size of the laptop;
  • whether you have a mechanical hard drive or a solid-state drive;

Continue reading

7 Signs That Your Computer Is Infected With Malware

Infected Systems

Malware (short for malicious software) is an umbrella term that encompasses many different types of malicious code including:

  • Viruses
  • Spyware
  • Ransomware
  • Adware
  • Key loggers
  • Trojans
  • And more

Continue reading

Boost Productivity With Multiple Monitors

Dual Monitor Setup

Using two or more screens on your computer is no longer reserved for specialised jobs or computer geeks. Having additional displays can benefit anyone, even office users can benefit greatly by using the extra screen space. Continue reading

Think Before Sharing Your Documents

Sharing Files

Cloud sharing makes it very easy simple to share files (documents, presentations, spreadsheets etc). In SharePoint, OneDrive, Dropbox, Google Drive you can simply click on a document and click “share”. A link is created, which you can then copy into an email. That done, you can move on to your next “to do” without thinking about it any longer. Continue reading