- ABOUT US
- CONTACT US
If you still have problems, please let us know, by sending an email to firstname.lastname@example.org Thank you!
A global ransomware attack is holding thousands of computers hostage. Banks, telephone companies and hospitals have all been ensnared in the worldwide hack, with the malware locking down computers while demanding a hefty sum for freedom. The attack has hit thousands of computers across China, Russia, Spain, Italy and Vietnam, but hospitals in England have attracted the most attention because lives are at risk while hospital systems are locked down. As of Sunday morning, more […]
Setting the scene Sheila from an IT Helpdesk was trying to go home. Traffic was building up, and a 30-minute trip back home would become an hour’s trip shortly. Just as she’s about to shut down, she receives an email appearing to be from a very important customer, with an attachment claiming to be a screenshot of a problem. Always keen to do her bit for the company, Sheila stays a few minutes late to […]
1. Network infiltration is the basis for many high-profile attacks, and it involves exploiting weaknesses in software, systems, hardware or staff to gain privileged access to servers and workstations. There are many ways to hack your network and cyber-security experts will tell you that it’s not a matter of if you get hacked – but when. Once the attacker has gained entry to a trusted device on your network, then he’s spoilt for choice: […]