DNS layer security

DNS layer security Your first line of defence against malware. For just £3 per device per month you can protect your business from malware and cryptlockers. What is DNS? DNS (domain name system) is a protocol that performs address translation. Every website has a unique address called an IP address and it is the job […]

Protecting your children when they use the Internet

The Internet is a wonderful resource, a source of education and entertainment for everyone. However, there is also a lot of content which may not be suitable for a young mind and as a parent it is you responsibility to minimise your children’s exposure to this material. Up until recently there has been very little […]

Security concerns of BYOD

BYOD (Bring your own device) is an increasingly popular trend within businesses. Mobile devices come in all shapes and sizes, from smartphones and tablets to laptops and even smart watches. But while BYOD is can be advantageous in many scenarios, it can also open your organisation up to serious security concerns. Security concerns of BYOD […]

Creating a secure password, and one that you will remember!

Creating a secure password, and one that you will remember! We all know how annoying it is to try and come up with a password that is not only secure but that is memorable. It also seems like almost every week another company has been hacked and passwords stolen. In the continuing battle to create […]

Spam and Malware Network Offline

A botnet called Necurs which is believed to be made up of around six million infected Windows machines has gone quiet according to internet security firms. Necurs has been used to send junk mail and malware from various cyber-thieves but in recent months has appeared to slow down. The first signs of this was the […]

What is a rootkit?

A rootkit is a type of malware that enables remote control of a user’s computer without their knowledge. Once a computer has been infected it becomes part of a botnet, the goal of which is to create a network of infected computers that can be used by cyber-thieves to do their bidding.

What is a botnet?

A botnet is made up of computers that have been compromised by a malicious program known as a rootkit. These computers are then used to perform tasks without the owner’s consent. The most popular uses of a botnet are sending large volumes of spam email and launching denial of service attacks.

Malware Removal

Malware Removal What is Malware? Malware is a blanket term used to describe any computer program that is created with the intention of harming a computer, the data stored on it, or intercepting information and sending it on to cyber thieves. Unfortunately, malware is very much a part of modern life when using a computer. […]

Securely deleting data

When you delete a file from your computer it may appear to be gone but in reality the information remains on the hard drive. All that has been removed is the link to the file and until new data is written to the same position on the drive, the file can still be retrieved. This […]

Spotting fake emails

Spam emails are a fact of modern day life. Here I will go through an email that I recently received that claims to be from Santander. As expected, the email is written in such a way as to cause panic and fear. The goal is to get you to act immediately before their website is […]