With a lot of business processes now largely cloud-based, compromised passwords are the quickest and easiest way for bad guys to exploit computer systems. So how can you protect your online and offline accounts and data? The best way is with multi-factor authentication (MFA). See our blog article on Why Multi-Factor Authentication is Important. Continue reading
Category Archives: Internet
7 Signs That Your Computer Is Infected With Malware
Malware (short for malicious software) is an umbrella term that encompasses many different types of malicious code including:
- Viruses
- Spyware
- Ransomware
- Adware
- Key loggers
- Trojans
- And more
6 Ways to Stop Social Phishing Attacks
Phishing is the number one method of attack for everything from ransomware to credential theft. Email phishing is the main method for delivery but other delivery means are on the rise. Continue reading
5 Ways to Protect Your Online Accounts
The rise in cloud services has caused a big increase in hacked cloud accounts. Compromised login credentials are now the #1 cause of data breaches around the world according to IBM Security’s latest Cost of a Data Breach Report. Continue reading
4 Google Search Tips To Save You Time!
Did you know that there are over 2.4 million searches every minute on Google?
Most people search daily for both personal and work needs, and finding the actual results you need can take some time as you often have to wade through irrelevant results. Continue reading
Phishing Attack Trends to Be Aware of in 2022
Phishing remains one of the biggest dangers to every business’s security as it is the main delivery method for all types of cyberattacks. Cisco’s 2021 Cybersecurity threat trends report shows that at least one person clicked a phishing link in around 86% of organizations and suggests that phishing accounts for around 90% of data breaches. Continue reading
The Power of a Password Manager
All of us like to think that we are unique and that thinking extends to our passwords too, right? We are special and distinct, and no one could guess our specific combination of letters, numbers and symbols. Well, did you know that it is very easy for computers to very quickly determine passwords. So, using a password manager is a great move, as you can securely store your passwords in an easily retrievable way. But is your master password for your password manager secure, original and long enough? Continue reading
Understanding the Cost of IT Downtime
Business downtime can be costly and there is plenty of research that show just how much it can set a business back. Some small businesses can not even bounce back due to the costs involved with an extended downtime. My latest blog article outlines the many expenses a business can encounter as a result of downtime. Continue reading
Ransomware is a Risk for Everyone – Big or Small!
Most people see reports on ransomware hitting government departments, hospitals and other big name companies. As such they think it won’t happen to them as the bad guys are just targeting the larger companies and organisations, but ransomware can just as easily infect your own computer. Continue reading
MS Edge – Is It Any Good?
In the internet browser market, Microsoft has made enormous strides since discontinuing the much-maligned Internet Explorer. Microsoft Edge is the successor to Internet Explorer and arguably provides the best web experience for business users. Continue reading