Spoof Emails: How To Spot A Spoof

An email inbox

What is a spoof email? A spoof email is when a person sends an email pretending to be someone else, in order to trick the recipient into handing over sensitive information or money. Sensitive information could be your bank card numbers, address, postcode, phone numbers, answers to security questions or even login information for online […]

Our 6 Top Malware Prevention Tips: Viruses and Malware

If you’ve read our series on viruses and malware, you may be wondering what steps you can take to protect yourself, your family, and your business. Well, you’re in luck! Here are our six top tips: If the email looks suspicious, don’t open attachments or click links! If you get an email that seems suspect, […]

Keyloggers: Viruses and Malware

A lit computer keyboard

In our last blog, we looked at spyware and how it could sneakily record everything you did on your computer. Today’s we’re looking at keyloggers, a variation of spyware with a very specific way of tracking. What’s a keylogger? Like spyware, a keylogger is designed to work covertly with malicious intent, but instead of potentially […]

Spyware: Viruses and Malware

We have seen a lot of cases of spyware-infected machines in our workshop, but what is so secretive about spyware? What is Spyware and what can it do? Spyware is programmed to be covert, gathering information and sending it off to its developer without you even knowing it’s there. Like a secret service spy hiding […]

Adware: Viruses and Malware

Adware is a common type of malware that can be particularly annoying. Simply put, adware is unwanted software that displays advertisements on your screen. These ads can occur as pop-ups, on your internet browsers, as toolbars, or in any way that ads can be displayed. Though don’t confuse this with genuine adverts that run on […]

Introduction: Viruses and Malware

Computer malware and viruses are terms we’ve all heard of before but what do they mean? What different types are there? And how do you protect against each of them? In the next series of blogs, we’re going to look at the most common types of viruses and how they can infect your system, and […]

The Cloud: What is it and how is it used?

Whilst cloud computing may sound mysterious and confusing, it’s actually a really simple concept. In today’s blog, we’re going to look at what the cloud is and how it can be used at home and in your business. What is the cloud? Simply put the cloud is when you access information that is not stored […]

Managed EDR: The Best Protection

Cybersecurity used to mean download some antivirus software and that was that – easy. But every year we see new threats that use previously unseen techniques to access your data. Your classic antivirus can’t keep up with that. That’s where EDR (or endpoint detection and response) comes in. EDR is the cutting edge of anti-virus […]

Firewalls at Home: What and Why?

You may have heard about firewalls at some point but, unlike anti-virus, it’s not immediately obvious what it does. But did you know that firewalls are a really important element of your home and business IT security? Today we’re going to look at what firewalls are, how they work and why they are such an […]

Firewalls and Your Business: What and Why?

You may have heard about firewalls at some point but, unlike anti-virus, the name doesn’t really explain what it does. Firewalls are a really important element of your home and business IT security. Today we’re going to look at what firewalls are, how they work and why they are such an important element of your […]