Category: News

Phishing vs. Two-Factor Authentication

Phishing vs. Two-Factor Authentication

Recently, a friend shared that she received a phone call from someone claiming to be from her bank, requesting access codes from her authentication app. It turned out to be a scam aimed at gaining access to her bank account. Phishing Scams Phishing is a common scam where a malicious user tries to gain access […]

Location Sharing

Location Sharing

For anyone venturing out alone, mobile phones can provide peace of mind. While being able to call someone in an emergency is invaluable, modern smartphones offer an extra layer of safety by allowing you to keep other people updated on your location in real time. It’s also more convenient sometimes to show someone where you […]

Windows 10 End of Life:  Six Months Remaining

Windows 10 End of Life:  Six Months Remaining

Are you still using Windows 10? The Clock is Ticking Windows 10 will reach its end of life in just six months. It will continue to receive updates until then, but official support will cease after that point. This might sound appealing if you’ve ever been interrupted by an untimely update, but the risks are […]

Why does the type of 365 licensing matter?

Why does the type of 365 licensing matter?

In our last article we talked about the history of the different account types. So, how much does this matter in a practical sense? It’s tempting to use a home licence for your business needs; it’s cheaper and business owners often already have a home licence that can be shared with up to five employees. […]

Personal and Work accounts; what’s the difference?

Personal and Work accounts; what’s the difference?

Click here for the previous article Following on from our previous article, where we summarised the basic differences between the account types, we realised that the amount we could say about it in detail is quite a lot. To avoid swamping users with a wall of text, we’re going to break it into smaller parts […]

Types of Account

Types of Account

Do you know which kind of account you use to log in to your computer? There are three types and they each have different functionality. The local account belongs to the computer, the personal account belongs to an individual, and the work or school account belongs to an organisation. Here’s a quick explanation of what […]

The Importance of Locking Your Computer

The Importance of Locking Your Computer Someone leaving a computer unattended, while a malicious user decides to use it

Locking the Computer Environments such as libraries, offices, or shops, where your computer might be accessible to the public or unauthorised individuals pose an often-overlooked security risk: someone else using your computer while it’s logged in as you. This can have significant consequences. Potential Risks Minor Mischief: On the less dangerous side, someone might post […]

Using Password Managers To Keep Your Password Secure

Using Password Managers To Keep Your Password Secure A set of unique keys on a keyring

Do You Reuse Passwords? In today’s digital age, the security of our online accounts is paramount. General security guidelines strongly advise against reusing passwords across multiple accounts. The reason is simple: if one login is compromised, it could potentially grant access to all other accounts using the same password. However, remembering a unique password for […]

Two-Factor Authentication (2FA) and How to Recover If You Lose Your Phone

Two-Factor Authentication (2FA) and How to Recover If You Lose Your Phone

In today’s digital age, securing your online accounts is more crucial than ever. Cyber threats are constantly evolving, and traditional passwords alone may not be sufficient to protect your sensitive information. This is where two-factor authentication (2FA) comes into play. If you’re not familiar with 2FA, it’s a security measure that adds an extra layer […]

Oops, laptop broken!

Oops, laptop broken! A man accidentally spilling a glass over a laptop

The Importance of Being Prepared for IT Disasters: Prevention and Recovery Imagine this scenario: You accidentally spill a glass of water over your main computer and it becomes non-functional. What would be the financial impact on your business: That day? That week? That month? Do you have a plan in place for such an incident?How […]