web counter
RECENT BLOGS
Security

Beware of Cyber Hackers this Christmas

As you probably already know, December is one of the biggest shopping months of the year! Around this time, there is often a rise in cyber attacks targeting Christmas shoppers online. We’re going to look at the different things you should look out for to avoid getting caught up in any internet scams.

Data

What is a Cloud Server and What Are the Benefits?

Put simply, a cloud server is a virtual server running in a cloud computing environment, as opposed to a physical server.  On the other hand, a physical server is a piece of equipment where data can be stored and read. Physical servers can be served on your business site or a co-location facility with a trusted vendor. There are indeed some benefits to physical...

cloud server concept
IT Support

AWS vs. Azure: Which is Best?

Are you looking for the perfect ‘Software as a Service’ (SaaS) for your business? There are many on the market, each with their own pros and cons. Here at ICT Solutions, two of the marketing-leading packages that we offer are Amazon Web Services (AWS) and Microsoft Azure. We’re going to take a look at both of them, which should help you determine the best...

Data

How Will Brexit Affect GDPR?

With the uncertainty surrounding Brexit, many are worried about what will happen to data transfers and data protection if the UK leaves the European Union. For businesses that transfer data across EU nations, there is particular concern.  Will the UK have to comply with GDPR after Brexit? If so, will certain rules change?   What we know so far In the event...

General Data Protection Regulation (GDPR) on the european union flag
News

Libra: Concerns About Facebook’s New Digital Currency

It’s likely that you’ve heard about Facebook’s proposed digital currency in recent weeks. The company claims that Libra would allow people to exchange money on a worldwide scale, with the same ease of sending a text or photo. For the 31% of the global adult population who don’t have a bank account, this could create a more stable medium for currency exchange....

bitcoin, euro, pound and dollar signs floating around
Security

Business Email Compromise: The Ins and Outs

According to AIG  - one of the world’s leading global insurance organisations - ‘business email compromise’ (BEC) has overtaken data breaches and ransomware as the main trigger of AIG cyber claims in Europe, the Middle East and Africa. In 2018, BEC accounted for nearly a quarter of reported incidents, up significantly from 11% in 2017.   So What Exactly is...

Hand in black glove types on computer keyboard with cash next to it
SecurityTechnology

The History of Digital Authentication

What is Digital Authentication? Digital authentication refers to the process by which a user’s identity is established and presented electronically. This is usually in order to gain access to an information system. Digital authentication is ingrained in our everyday lives, however, this was not always the case.   The 1960s The 1960s was the first time that...

digital authentication fingerprint concept