Uncategorized

IT Security and Support Issues, GDPR 2018

2017 saw some significant cyber-attacks that brought down both large institutions and small businesses, to the tune of 5 billion. The WannaCry attack on the NHS alone cost at least £180 000. The next 12 months is unlikely to pass without cyber threats to your own business, or a business that you work with. There is benefit in knowing how trends are developing, so you can focus your IT teams on shoring up your defences. Get ahead of the issues ...

Continue Reading →
0

Ransomware

What is a ransomware attack?

Ransomware is one of the biggest problems on the web right now. It’s a form of malicious software — malware — which encrypts documents on a PC or even across a network. Victims can often only regain access to their encrypted files and PCs by paying a ransom to the criminals behind the ransomware.

A ransomware infection often starts with someone clicking on what looks like an innocent attachment, and it can be a headache for ...

Continue Reading →
0

Teslalocker TeslaCrypt help

TeslaLocker V3 is a very dangerous computer virus of the ransomware family. These types of viruses specialize in money extortion – it is likely that you have already seen the ransom demand message. Your files are held hostage – when the ransomware infected your computer it started encrypting them. The virus usually announces its presence only after it is done with that process. We’ve written this article in order to help you deal with Tesla Locker V3 and in order ...

Continue Reading →
0

SSL Certificate Issues

Computer maker Dell recently warned of a security hole affecting recently shipped computers that could leave users vulnerable to hackers.

The issue affects computers made by Dell that come with a particular preinstalled customer service program. Through a certificate that would identify the computer to Dell support staff, this program makes the computers vulnerable to intrusions and could allow hackers to access encrypted messages to and from the machines, Dell said. There is also a risk that attackers could attempt to ...

Continue Reading →
0