Get in touch:

A Virtual Private Network, or VPN, is a connection method that’s designed to give your network an added layer of security when using the internet. They’re commonly used by larger corporations that store and transfer large amounts of sensitive data […]

Check today – before it’s too late. If your passwords have been compromised or stolen, you need to act now. Once cyber criminals have your precious details to hand, they can access your personal, financial and business applications online – […]

In a recent article, we looked at phishing emails in general and how to spot them. This time, we’re focusing on the dangers of infected email attachments, as these seem to be the phishing method of choice at the present […]

Phishing emails are spam emails that con you into thinking they’re genuine communications from a bona fide organisation. A typical example is an email that looks like it’s come from your bank and asks you to log into your account. […]

This is a question we’re often asked by our clients – and with good reason, as it can be a hazy area. In fact, the terms are often used interchangeably. And to add to the confusion, many people do actually […]

Does your business have a disaster recovery plan in place? If not, it’s something you need to think seriously about implementing, to make sure your business can survive and continue trading if your IT systems are damaged or destroyed by […]

12