An astonishing 30% of people say they have never backed up their data! We remind you of the importance of protecting your critical data.
Read MoreIT Security
HSBC Buys Collapsed Tech Bank
There was some relief from UK businesses hoping for government help following the collapse of Silicon Valley Bank (SVB) after HSBC rescued the UK arm of the bank by buying it for ยฃ1.
Read MoreWhy Use Outsourced IT Support?
We look at the benefits and the possible drawbacks of opting for outsourced IT support.
Read MoreNo Bank Robberies For First Time Ever (in Denmark)
Although figures show no bank robberies last year in Denmark, it appears online banking fraud and other forms of digital crime are now replacing the traditional ‘hold-up’.
Read More‘PimEyes’ Search-By-Photo Stalker Scare
Privacy campaign group Big Brother Watch has filed a complaint to the ICO that the face recognition search engine PimEyes may be unlawful, plus it could be enabling surveillance and stalking.
Read MoreForget Hacking, What About Tracking?
Why are we being tracked and what measures can we take to avoid it?
Read MoreNearly Half of Employees Use Risky Login Practices
๐ A new study has revealed that almost half of employees put their companies at risk by using risky online habits to avoid difficulties logging in and out of apps at work. ๐
Read MoreThe True Cost Of Using Pirated Software
In this article, we look at how the risks to businesses posed by pirated software can far outweigh the benefits of using it, and how you can protect your business from the true costs of pirated software.ย
Read MoreProtect Yourself From Job Phishing Scams
In this article, we look at what โjob phishingโ is, how it works, and how you can protect yourself from this type of fraud. What Is Job Phishing? Job phishing refers to recruitment/employment scams where fraudsters pose as recruitment agents or reputable companies. The fraudsters post fake job descriptions and […]
Read MorePros and Cons of Weakening Encryption
With the Online Safety Bill threatening to undermine end-to-end encryption, we look at the strengths and weaknesses of this security trade-off.ย
Read More