Category: Articles

The 10 laws of computer security

Law 1: If a bad guy can persuade you to run his program on your computer, it’s not your computer anymore It’s an unfortunate fact of computer science: when a computer program runs, it will do what it’s programmed to do, even if it’s programmed to be harmful. When you choose to run a program, […]

Posted in Articles

The dangers of phishing

A cautionary tale of a very convincing fraud One of our engineers recently received a support call from a customer who’d been caught out by a telephone call. The caller, phoning around 9.00 o’clock one morning, claimed to be from Microsoft. Our customer was understandably grateful to “Microsoft” for telephoning them to “help them” with […]

Posted in Articles

What does downtime cost you?

How reliant are you on your computer systems? Would a period of time without access to your emails, files, or the Internet cost you productivity, profit or reputation? Can you be sure that your backups are running properly every night, safeguarding all of your important files? There’s often no obvious indication that something’s going wrong […]

Posted in Articles