++It’s not our devices that are our most valuable assets — it’s the data we create and store on them++ Laptops can be repurchased and operating systems can always be reinstalled, but the user-created data — the photos we take, the stories we write, the records we keep — that’s the stuff that can never […]
How Ransomware Spreads: 9 Most Common Infection Methods And How To Stop Them
Cybercriminals are looking for creative new ways to hold your data hostage. However, while ransomware might be getting more sophisticated, it’s important to remember that it still has to abide by the same rules as regular old malware. That means it still has to be distributed, it still has to infect your system before it […]
25 Years and Counting!
June 2019 marks the start of our 26th year in business. Over the last 25 years, thanks to the support of our local community, we have carried out tens of thousands of repairs to Windows and Mac computers and networks; sold many thousands of computers and devices; supported local sports, emergency services, charities, schools and […]
Phishing, Spear Phishing and Whaling!
Gone are the days when phishing emails were typo-laden messages demanding you to click on a link and enter your credit card details into some eyesore of a website. Today’s phishing attacks are advanced, sophisticated and scarily believable, which perhaps explains why 22 percent of employees clicked on a phishing email in 2018, according to […]
8 Critical Safety Tips for Safer Online Banking
There are some inherent risks associated with using any online service, but nowhere are the stakes higher than in the world of Internet banking. Make a simple security slip up and there’s a chance that the wrong person could get their hands on your login details – or worse, your transaction authentication number (TAN) – […]