Category: Articles

The 10 laws of computer security

Law 1: If a bad guy can persuade you to run his program on your computer, it’s not your computer anymore It’s an unfortunate fact of computer science: when a computer program runs, it will do what it’s programmed to

The dangers of phishing

A cautionary tale of a very convincing fraud One of our engineers recently received a support call from a customer who’d been caught out by a telephone call. The caller, phoning around 9.00 o’clock one morning, claimed to be from

What does downtime cost you?

How reliant are you on your computer systems? Would a period of time without access to your emails, files, or the Internet cost you productivity, profit or reputation? Can you be sure that your backups are running properly every night,

Top