A plague on your smartphone

BYODYou may see your wonderful smartphone as an electronic brain in your pocket but IT departments the world over see them as potential plague-carrying devices that can wreak untold damage to a company network from mass data theft to viral infections. You can play your part in ensuring your company’s accounts are not plundered by getting up to speed with the issues and getting ahead of the game.

Read more


Biggest online hacks of all time

data breachEnormous online data loss drives a huge underground industry in phishing and the sale of personal data. It fuels cybercrime and has given rise to many websites on the dark web that trade in personal data. It provides hackers with a reason for being and stokes the fires of nefarious online behaviour. And it is happening with alarming frequency.

Read more


Out of control kids?

internet and kidsThe digital generation gap can leave parents floundering as they try to keep up with their children’s digital expertise. Many, understandably, are worried that the kids can be exposed to all sorts of online nasties and don’t know what to do about it. A BullGuard survey illustrates this with the vast majority of parents feeling like their children are growing up far too quickly. But a few simple steps can help educate the children while also ensuring parents can still keep a protective but discreet arm around them.

Read more


Everybody loves email

emailFrom grans and granddads to high flying executives, seasoned IT veterans and thrusting entrepreneurs – everybody loves email so much they don’t even think twice about it. It just is. Hackers love it too because it can be a key to a company’s digital front door – and let your corporate guard down and they’ll be in quicker than you can say Trojan.

Read more


Watch out, an Exe is about

email malware .exe attachments are a favourite tool for cyber villains to download malware onto your computer. That said they’re easy to identify and safeguard against if you know what you’re looking for. But hackers take it as a given that most people don’t know how to identify different file types hence the continued popularity of .exe attachments to hide malware.

One of the most common tricks used by hackers is to get unsuspecting users to click on a malicious .exe file which leads to malware being downloaded onto a computer. They’re usually sent to you as an email attachment with the email offering some form of compelling inducement to get you to open the attachment.

Read more


Spooky silence

HalloweenBet you didn’t know that according to Wikipedia Halloween is a Christian feast influenced by Celtic harvest festivals with possible pagan roots, particularly the Gaelic Samhain. Thought so. But does it matter? Today Halloween is great fun for children… and hackers. Hackers? In the parlance it’s a calendar event that is used to slip all sorts of rogue malware beneath the radar. But this Halloween it’s eerily quiet on the hacking front, which begs the question, what’s cooking in the cyber crime cauldron?

Read more


Blog it… and back it up

blog hackedWith something like 500 million blogs out there some of them are inevitably going to be compromised by hackers. If you find that your blog has been hacked the first step is to check whether the web hosting company that provides the blog platform has been hacked. If not, then you’re probably the victim of a specific attack. If so, there are a few simple things you can do to get you and up and running again… and to stop any future attacks.

Read more


Media storm sets the scene

hackWith high profile cyber hacks happening almost every week and the media often covering them in a breathless and sensationalist manner you’d be forgiven for thinking that going on to the internet is the equivalent of heading to Raqqa in Syria waving a large crucifix – a suicide mission. While of course, there are many dangers for the unprotected we’re not under siege by cyber misfits, we’re simply dealing with the downside of an interconnected world.

Read more


Ten top tips for safe online banking and shopping

credit cardOnline banking and shopping are great ways to keep on top of your finances and buy the things you need without having to elbow, and be elbowed, your way through high street crowds. However, both activities are targets for hackers keen to get their digital paws on your personal information. That said, follow a few simple rules, as set out below, and you’ll be safe.

Read more