web counter
RECENT BLOGS
Security

Business Email Compromise: The Ins and Outs

According to AIG  - one of the world’s leading global insurance organisations - ‘business email compromise’ (BEC) has overtaken data breaches and ransomware as the main trigger of AIG cyber claims in Europe, the Middle East and Africa. In 2018, BEC accounted for nearly a quarter of reported incidents, up significantly from 11% in 2017.   So What Exactly is...

Hand in black glove types on computer keyboard with cash next to it
SecurityTechnology

The History of Digital Authentication

What is Digital Authentication? Digital authentication refers to the process by which a user’s identity is established and presented electronically. This is usually in order to gain access to an information system. Digital authentication is ingrained in our everyday lives, however, this was not always the case.   The 1960s The 1960s was the first time that...

digital authentication fingerprint concept
Security

Is My Phone Listening to Me?

Everybody seems to have a story that makes them wonder if tech giants are listening to them through their mobile phones. We're going to look at whether this is possible.
a business woman using her phone in the office
DataSecurity

How to Delete Old Online Accounts

Old accounts that you’ve forgotten about and don’t use anymore could be putting your personal information at risk. We’re going to look at how this could happen, and show you how you can delete these so-called ‘zombie’ accounts.
Login Screen
DataSecurity

How to Keep Your Data Safe Online

Keeping passwords, financial information and other personal data safe is an increasingly difficult task for both individuals and businesses. With sophisticated cyber attacks on the rise, it is very important that users follow sound practices to stop their own data - and other people’s data - from falling into the wrong hands. We’ve come up with some suggestions to help you protect your data, and though there are many ways for you to do this, this article should help provide a basis.
Network security icon with person on laptop
IT SupportTechnology

The Impact of SaaS

A few years ago, it used to be the case that every request for a new device, application or piece of software had to run through a company’s IT department. Spring forward to 2019, and the rise of ‘Software as a Service’ (SaaS) has meant that many staff are now able to do it for themselves. This is just one of the many ways in which SaaS has reshaped business operations over the last few years. We’re going to delve further into its influence, and let you see how your business could benefit from utilising the delivery model.
Software as a service, cogs and data background
Security

Cybersecurity and the 5G Network

5G has been a hot topic in the news for the last few months. The fifth generation of mobile internet connectivity has promised us faster data download and upload speeds and wider coverage. Each year, we use more and more data, and we are using our mobile network for more demanding services, such as streaming or downloading videos. With download speeds estimated...

Abstract technology security on global network background,
IT Support

Case Study: Duke Street Market

Earlier this year, we won a contract to supply Liverpool's new Duke Street Market with a range of bespoke IT services. Find out more about the project in our latest blog post.
building and ict work on the new duke street market in liverpool