by Adam | Sep 10, 2011 | Blog
In all the best children’s stories the giant demands ‘Who goes there?’ and you need the password to get by. Today we all have dozens and dozens of places for which we need passwords. It’s impossible to remember them all – and it’s...
by Adam | Aug 10, 2011 | Blog
A few years ago files hosted on an offsite server were referred to as ‘being in the cloud’, but things have moved on and now Cloud Computing is about having many servers working together to support your computing activity. This means that your server is...
by Adam | Jul 30, 2011 | Blog
If you haven’t got a foolproof system for backing up your data regularly, you’re risking your business. If every document you’ve generated, every piece of customer information, all your accounts details, your contacts list and other critical data...
by Adam | Jul 10, 2011 | Blog
OK – maybe you’re not famous and don’t think you’re a target for hackers, but neither did the widows of soldiers who have been killed in Afghanistan or the parents of Milly Dowler and other missing children. You never know when you might come...
by Adam | Jun 10, 2011 | Blog
People talk about phishing, but what is it really? What is a phisher trying to do? Phishing is when someone is posing as a legitimate organisation in order to get log in details, so they can use them for their own advantage. This allows them access to spam your...
Recent Comments