Browse through our most recent articles to gain expert advice and recommendations for great hardware and software

Why Your Emails Are NOT Secure!

Are you sending emails securely? Remember the days before we used email in business? If you cast your mind back a few decades there was a time when people used to write their messages down by hand on paper, put it in an envelope and send it in the post.

Read more

CEO Impersonation Fraud

If you received an email from your manager asking you to pay £10,000 into a bank account urgently, would you do it? You might be surprised to hear that some people do. This type of scam is known as CEO fraud or CEO impersonation and it’s the topic for today’s blog.

Read more

Ransomware Explained & How To Stop It From Happening!

What do you think is the biggest technology threat to your business? The answer is ransomware. In this blog, I will explain exactly what ransomware is, why you should be concerned and what you can do to protect yourself and your business.  NHS Ransomware Attack Ransomware hit national headlines in the UK in 2017, when […]

Read more

Backup VS Disaster Recovery

In this blog, I am going to introduce you to two concepts. Those are backup and and a term called business continuity.  As a business owner, it’s really important that you know what these two terms are and how  important they are to your business.

Read more

How Does A Phishing Attack Actually Work?

In one of my previous blogs we talked about phishing attacks; what they were and how you can protect yourself against them. In this blog, we’re going to delve a little bit deeper and talk about how hackers use phishing attacks to steal your money. Phishing is easy Cyber criminals love to hack into email? […]

Read more

What is Phishing? How can you Prevent it?

According to a survey, last year alone 94% of businesses reported that it had experienced a phishing attack.  Add to this that phishing attacks are one of the favourite routes into your business for a cyber-criminal. The majority of ransomware attacks start with a successful phishing attack.

Read more