Cybercrime with Chris Neilson

Cybercrime with Chris Neilson

CybercrimeThere are many different types of cybercrime, with new methods constantly being used. Some of the most popular cybercrime examples include phishing, malware attacks, The Big Boss Scam, as well as exploitation. These cybercrimes are organised by groups of...

read more
What is Cryptowall?

What is Cryptowall?

What is Cryptowall?The Trojan Cryptowall virus is a Trojan horse that encrypts files on the compromised computer. It then asks the user to pay to have the files decrypted. After they pay, the user is allowed to download and run a file and/or application to clean up...

read more
Our Top Three Business Tools

Our Top Three Business Tools

Virtual business toolsAs a company providing small business IT support, we ensure our technicians are equipped with the right business tools. Therefore, each of our technicians carry their own flight cases with the tools to fix most physical IT issues. However, it’s...

read more
Business Guide to Microsoft 365

Business Guide to Microsoft 365

Most people think Microsoft’s Office 365 (Microsoft 365) is Word/Excel/PowerPoint and a bit of email in the cloud. It’s not. Office 365 (Microsoft 365) is Microsoft’s name for a suite of software and technology solutions which are available as a subscription. There...

read more
Social Media

Social Media

How much data do your social media profiles reveal?Social media is a big part of modern day personal and business life. Whether it’s staying in touch with friends or launching a new advertising campaign, social media is so important. It’s a valuable tool which extends...

read more
User Accounts

User Accounts

Do you know who has access to what data?Setting up user accounts is something dedicated IT support companies will suggest. Having user accounts means you have control over who has access to what in your business as well as ensuring that unauthorised people don’t have...

read more