IT Security

What are Mobile Phishing Attacks?

What are Mobile Phishing Attacks?

Mobile phishing attacks continue to be on the rise and pose a real danger to businesses and it's data. Business owners need to look at this, in particular in today's climate, where staff members are using their personal devices to access work information. Due to the...

Zoom Issues and Best Practices

Zoom Issues and Best Practices

Zoom, depending on what you read, has gone from a reported 10 million users to over 350 million worldwide in a matter of weeks. It’s little surprise that it has had its share of issues and vulnerabilities. This article discussed video conference security and how you...

Surviving a Denial Of Service Attack

Surviving a Denial Of Service Attack

Denial Of Service Attacks Or DOS or Distributed Denial of Service (DDOS) attacks. These aren't reported on that often in the media, but they are still a major threat to a business, in particular one that relies on it being online and available to its customers. We...

Microsoft ends Windows 7 support: What should you do?

Microsoft ends Windows 7 support: What should you do?

Image copyright Oli Scarff Cyber-security experts are urging Windows 7 users to upgrade their operating system. Microsoft is going to stop supporting Windows 7 from Tuesday so that it can focus on “newer technologies”. As a result, Windows 7 users will no longer receive the all-important security updates and patches that keep their machines safe.…

Microsoft Vulnerabilities January 2020

Microsoft Vulnerabilities January 2020

Today Microsoft released several patches to address critical vulnerabilities. A number of these were deemed critical enough to warrant the US Department of Homeland Security to issue an Emergency Directive ordering all Federal agencies to patch these vulnerabilities...

Categories

Tag Cloud

Your browser doesn't support the HTML5 CANVAS tag.

Contact Us

Office

54-56 Victoria Street,
St Albans,
AL1 3HZ

Call Us

Pin It on Pinterest