blog

These cybersecurity tactics will help businesses survive 2021

Security professionals take three steps: threat detection, immediate action and long-term defence. All companies should [...]

Apple Wave

If you’ve been online a while, you’ve probably heard of Apple Wave, an “update” that [...]

How To Read Minecraft Computer Requirements

Shopping for a computer used to be so simple. You’d walk into a store, buy [...]

Microsoft Set to Block SolarWinds Orion Binaries

  Microsoft is preparing to quarantine malicious versions of the SolarWinds Orion application used in [...]

Twitter Fined Half a Million Dollars for Privacy Violation

Twitter has been fined over half a million dollars for violating European Union data protection laws [...]

Don’t Plug In Found USB Sticks

Don’t Plug In Found USB Sticks Did you find a seemingly normal USB stick on [...]

How to Destroy a Hard Drive (Accidentally): A List of Common Items and “Hacks”

1. Those fancy Neodymium (or rare-earth) magnets. Strong magnets can erase credit cards and fuzz [...]

Web app attacks are up 800% compared to 2019

Report finds many attacks focus on companies least impacted by COVID-19 outbreak Web application attacks [...]

Are you getting the most out of Microsoft Teams?

Whether or not you made the journey back to the office during the relative relaxation [...]

Working in The Cloud

As we have previously explored, the world has been turned on its head by the [...]