web counter
RECENT BLOGS
IT Support

AWS vs. Azure: Which is Best?

Are you looking for the perfect ‘Software as a Service’ (SaaS) for your business? There are many on the market, each with their own pros and cons. Here at ICT Solutions, two of the marketing-leading packages that we offer are Amazon Web Services (AWS) and Microsoft Azure. We’re going to take a look at both of them, which should help you determine the best...

Data

How Will Brexit Affect GDPR?

With the uncertainty surrounding Brexit, many are worried about what will happen to data transfers and data protection if the UK leaves the European Union. For businesses that transfer data across EU nations, there is particular concern.  Will the UK have to comply with GDPR after Brexit? If so, will certain rules change?   What we know so far In the event...

General Data Protection Regulation (GDPR) on the european union flag
News

Libra: Concerns About Facebook’s New Digital Currency

It’s likely that you’ve heard about Facebook’s proposed digital currency in recent weeks. The company claims that Libra would allow people to exchange money on a worldwide scale, with the same ease of sending a text or photo. For the 31% of the global adult population who don’t have a bank account, this could create a more stable medium for currency exchange....

bitcoin, euro, pound and dollar signs floating around
Security

Business Email Compromise: The Ins and Outs

According to AIG  - one of the world’s leading global insurance organisations - ‘business email compromise’ (BEC) has overtaken data breaches and ransomware as the main trigger of AIG cyber claims in Europe, the Middle East and Africa. In 2018, BEC accounted for nearly a quarter of reported incidents, up significantly from 11% in 2017.   So What Exactly is...

Hand in black glove types on computer keyboard with cash next to it
SecurityTechnology

The History of Digital Authentication

What is Digital Authentication? Digital authentication refers to the process by which a user’s identity is established and presented electronically. This is usually in order to gain access to an information system. Digital authentication is ingrained in our everyday lives, however, this was not always the case.   The 1960s The 1960s was the first time that...

digital authentication fingerprint concept
Security

Is My Phone Listening to Me?

Everybody seems to have a story that makes them wonder if tech giants are listening to them through their mobile phones. We're going to look at whether this is possible.
a business woman using her phone in the office
DataSecurity

How to Delete Old Online Accounts

Old accounts that you’ve forgotten about and don’t use anymore could be putting your personal information at risk. We’re going to look at how this could happen, and show you how you can delete these so-called ‘zombie’ accounts.
Login Screen
DataSecurity

How to Keep Your Data Safe Online

Keeping passwords, financial information and other personal data safe is an increasingly difficult task for both individuals and businesses. With sophisticated cyber attacks on the rise, it is very important that users follow sound practices to stop their own data - and other people’s data - from falling into the wrong hands. We’ve come up with some suggestions to help you protect your data, and though there are many ways for you to do this, this article should help provide a basis.
Network security icon with person on laptop