When it comes to smart devices, don’t be dumb

Smartphones. How could we live without them, right? The average person unlocks their smartphone 80 times a day. 80! The mixture of power and convenience is just so useful. It’s no wonder companies are applying this technology to all sorts of appliances nowadays that you wouldn’t normally associate with being “smart”. Smart fridges, smart watches, smart toys. I could go on and on. It’s all about moving to the “internet of things”, designed to make our lives seamlessly integrated with the latest internet technology. By the end of 2017, consumers will be using 5.2 billion connected things, according to Gartner. That number is set to more than double to 12.8 billion by 2020. Seems great, right?

Read more ...

HTTPS: Secure by design

HTTPS. You’ve heard of this right? Think of it as your guardian encryption angel while you’re browsing the web, protecting you from all the evil gremlins that want to steal your data. You can spot whether it’s active on a particular webpage by looking at the URL. At the start of the web-address it should both show the https text and a lock/secure sign to ensure that you’re fully protected as you’re transmitting data over the internet.

Read more ...

Google pushes harder for Mobile Friendly Sites

Google recently made further changes to it's algorithm to ensure that it's users get good, relevant answers when using any device. They believe that you should get the best answer possible, whether you're on a phone, desktop or tablet.

Read more ...

What is a DDOS attack?

DDoS is short for Distributed Denial Of Service. It essentially eats up your bandwidth, making your system inaccessible to yourself and/or your customers. This can be used for many things such as distracting your security staff, protesting against your company (known as "hacktivism"), slowing down or even stopping your business.

Read more ...

Is Anti-virus software enough to protect your business?

Anti-virus software is great at what it is built for. It is created and updated to spot viruses that have been made before and ones that are coded in a similar way. You can also get different suites and packages that add extra security and detect some suspicious activities from malicious software.

Read more ...