RECENT BLOGS

DataIT SupportSecurity

Cyber Threats That Small Businesses Are Facing Right Now

Since the start of March, the coronavirus pandemic has changed the working lives of employees all over the world. In order to contain the virus, millions of workers have been forced into remote working, creating incredibly difficult challenges for business leaders in terms of cyber security.  In our previous article, we highlighted how there has been a...

cyber-threats
IT SupportSecurity

How Do I Know If Someone Is Hacking My Computer?

Computer hacks are becoming more and more frequent, with a particular increase over the past year amidst the global coronavirus pandemic. But how can you tell if your computer has been hacked?     Here are some of the main signs: Frequent pop-ups. If you start seeing pop-ups in your web browser (and they often appear in sites that don’t usually generate...

A computer screen with program code warning of a detected malware script program. 3d illustration
DataSecurity

How to Minimise Your Digital Footprint

Do you ever worry about your “digital footprint”? If you’re not familiar with the term, it can be defined as ‘information about a person that exists on the Internet as a result of their online activity’. Whether it’s making online purchases or posting on Facebook, you’re leaving a trace wherever you go.  Digital footprints don’t just attract hackers,...

a digital footprint
Security

Returning to the Office – a Cyber Security Checklist

It’s been almost six months since lockdown began, and things are slowly getting back to the way they were before the coronavirus pandemic. Many businesses have had their employees working from home since March, but are now encouraging them to return to the office.  If you’re one of the organisations doing just that, you presumably have various measures in place...

NetworkingSecurityTechnology

Why Access Control is Now More Important Than Ever

2020 will always be remembered as the year when everything changed. For many businesses, remote working became a lifeline at the beginning of the coronavirus pandemic — now, workers are slowly going back to the office and returning to a ‘new norm’.  While this return presents many new challenges for business owners and staff, we know that a good access control...

Close-up Of Hand Businessman Using Keycard To Open Door.
NewsSecurity

The Great Twitter Hack: What Went Wrong

On 15th July, social media giant Twitter suffered its most catastrophic breach in the company’s fourteen year history.  Targeting Twitter’s most influential celebrities, cyber-hackers conducted an attack promoting a cryptocurrency scam. The hacked accounts included the likes of Barack Obama, Bill Gates, Tesla CEO Elon Musk, Amazon founder Jeff Bezos as well as...

Hand of man typing text on mobile smartphone. Online chat chatting on application communication digital media website and social network.
IT SupportSecurity

Coronavirus and Cyber Attacks: The Knock-On Effect

The COVID-19 pandemic has transformed the way that many of us live and work. Our homes have now been turned into offices and classrooms, and we're reliant on the internet more than ever before. With remote working fast becoming the new ‘norm’, cyber-criminal activity has also risen over the last few months. According to Action Fraud, there was a 400% global...

Online hacker targets confidential information or personal data during coronavirus pandemic.