Corporate Blog

  • The trials and tribulations of old Operating Systems

    Using an old piece of software or Operating System cracks open a can of worms in terms of security issues, because sadly the older the system, the less compatible it is with newer fixes, patches and…

  • Jargon Buster Part 2: Two Factor Authentication

    In this Jargon Buster we’ll look at two-factor authentication, two-step verification and other ways to further secure your logins details.

  • Jargon Buster Part 1: Browsers and Plugins

    Computer jargon can be complicated and make understanding exactly what’s happening with your computer difficult. In this blog we seek to explain some common PC processes and jargon.

  • Internet security FAQ

    Mark James, ESET IT Security Specialist, gives us some answers to common questions relating to malvertising, Android malware and ransomware.

  • 65% of IT Leaders expect a serious data breach in the next 12 months

    Okta, a cloud IT company, recently released its first Secure Business Agility Report. Which discovered that 65% of IT Leaders believe that their business will be hit with a serious breach in the next…

  • Are your portable devices at risk?

    For work and leisure, we’re rarely away from our connected devices, whether these are laptops, tablets or smartphones. The obvious benefit is that we’re constantly up to date with work and reachable…