Category: Articles

The 10 laws of computer security

Law 1: If a bad guy can persuade you to run his program on your computer, it’s not your computer anymore It’s an unfortunate fact of computer science: when a computer program runs, it will do what it’s programmed to

The dangers of phishing

A cautionary tale of a very convincing fraud One of our engineers recently received a support call from a customer who’d been caught out by a telephone call. The caller, phoning around 9.00 o’clock one morning, claimed to be from

What does downtime cost you?

How reliant are you on your computer systems? Would a period of time without access to your emails, files, or the Internet cost you productivity, profit or reputation? Can you be sure that your backups are running properly every night,