Do you know what you have downloaded? Applications you download from Google Play, Apple store or any website often asks for permissions for your phone.…
In a world of cyber, is the humble password dead in the water? Not entirely! While the password has been around for centuries, ways of…
Just a very quick note to make sure you all have an up to date version of WhatsApp installed! Reports are that the company’s security…
Backups, they are boring. They are time consuming and no one has that sort of time, right? The thought of a backup is normally one…
What are they and why should you care? On Tuesday 26th March 2019, the European Parliament passed “The European Union Directive on Copyright in the…
Definition: A data breach is a security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual…
Though it sounds like a past-time enjoyed by people everywhere, Phishing is a nasty and very common threat to individuals and companies everywhere. Common Terminology…
The world is a big place full of discovery and wonder especially for our fledgling offspring. However (perhaps as-ever), there are a few out there…
Whether it is called a keylogger, spyware or monitoring software, it can be the equivalent of digital surveillance, revealing every click and touch, every download…
EMOTET, the “banking Trojan” that has been around since around 2014, but is still hitting companies cold. The malware program is hugely misunderstood, mostly due…