Category Archives: Security


Tech Insight : How To Check Your VPN

Tech Insight : How To Check Your VPN

In this article, we take a look at some of the ways users can assess how good their VPN really is. What Is A VPN? A ‘Virtual Private Network’ (VPN) is used to keep internet activity private, evade censorship / maintain net neutrality and use public Wi-Fi securely (e.g., avoid threats such as ‘man-in-the-middle’ attacks). A VPN achieves this by diverting a user’s traffic via…

Read More


Security Stop-Press : 50% Increase In Cyber Attacks On Corporate Networks In 2021

Security Stop-Press : 50% Increase In Cyber Attacks On Corporate Networks In 2021

Figures from software technologies company ‘Check Point’ show that an upward trend of malicious activity through 2020 reached a peak of 925 cyber-attacks a week per organisation at the end of 2021. The result of this trend was a massive 50 per cent increase in cyber attacks on corporate networks in 2021, with education and research the most attacked sectors


Tech Tip – Making Your Browser Remember Your Passwords

Tech Tip – Making Your Browser Remember Your Passwords

Your browser may have a Password Manager but sometimes an issue (e.g., conflicting extensions) may cause the browser not to save or remember your passwords. Here’s how to fix the issue for popular browsers Chrome and Edge: For Google Chrome: – Open the Chrome menu (the three dots top right) and select ‘Settings’. – Select ‘Autofill’ on the sidebar. – Choose the option labelled ‘Passwords’…

Read More


Featured Article : The Essentials Of A ‘BYOD’ Policy

Featured Article : The Essentials Of A ‘BYOD’ Policy

In this article, we look at what BYOD is, why a BYOD policy is important, and what elements form the essential blueprint of a BYOD policy. What Is BYOD? The term Bring Your Own Device (BYOD) has been around since 2004 when it was first coined as an expression. With BYOD, employees can bring and use their personally owned laptops, tablets, sometimes USB drives and…

Read More


Security Stop-Press : Phishing And Malware Threat Though Google Docs Flaw

Security Stop-Press : Phishing And Malware Threat Though Google Docs Flaw

Email security specialists Avanan have reported that hackers have been leveraging the comment feature in Google Docs to target primarily Outlook users. The attack works by hackers adding a comment to a Google Doc mentioning the target with an @. This automatically sends an email from Google to that target person’s inbox which contains bad links to malware or phishing sites. To protect themselves, users…

Read More


Tech Insight : What Is DuckDuckGo?

Tech Insight : What Is DuckDuckGo?

In this tech insight, we look at what DuckDuckGo is, what features it offers, and why businesses may consider using it. DuckDuckGo DuckDuckGo is a privacy-centred search engine / privacy browsing app, which is available as a download for mobile devices and a Chrome extension. The company, founded in 2008, also plans to launch a desktop browser for macOS laptops and desktops soon. Most Downloaded…

Read More


Security Stop-Press : Beware Of ‘Child In Need’ WhatsApp Scam

Security Stop-Press : Beware Of ‘Child In Need’ WhatsApp Scam

Action Fraud and WhatsApp have warned people to be on the lookout for a ‘child in need’ scam operating in the UK that has recently resulted in parents being conned out of £50,000. The con involves scammers targeting parents via WhatsApp, claiming to be one of their children and using different excuses to ask for a transfer of money e.g., the need to pay a…

Read More


Security Stop-Press : Ransomware Warning To Small Businesses 2022

Security Stop-Press : Ransomware Warning To Small Businesses 2022

Threat intelligence firm Analyst1 has warned that, as cyber criminals try to avoid the attention of law enforcement agencies, they are likely to target small businesses with ransomware attacks in 2022. Researcher Chris Fiormonti comments on the Analyst1 blog that “Instead of going after the high-profile attacks since the activity brings unwanted attention from the federal government, they will likely target smaller companies that will allow…

Read More


Featured Article : Christmas Cons

Featured Article : Christmas Cons

In this article, we take a look at some of the latest known online scams so that you can avoid falling foul of cybercriminals this Christmas. Christmas – A Great Opportunity For Scammers The extra spending at many different online shops, often for large amounts, and the requirement for delivery before the big day makes Christmas the ideal time for scammers to play with and…

Read More


Tech Insight : What Is ‘Surveillance for Hire’?

Tech Insight : What Is ‘Surveillance for Hire’?

After Meta (Facebook) recently reported alerting 50,000 people that it believed were being targeted by “surveillance-for-hire” entities, we take a look are who these entities are and what they do. Meta’s Report Following months of investigation, Meta recently informed 50,000 people that they were being targeted by seven “surveillance-for-hire” entities / “cyber mercenaries” who were targeting people in over 100 countries on behalf of their clients. It has…

Read More



Page 1 of 812345...Last »