LinkedIn takes action to tackle fake accounts
You might have noticed a sharp rise in the number of fake profiles and connection requests on LinkedIn lately. To stamp this out, LinkedIn is introducing new verification features.
Microsoft hints at some exciting Windows 12 developments
Windows 11 still feels like a new member of the family, but Microsoft’s operating system will soon be turning 12. Our sources have some interesting news about Windows 12 and we wanted to share the exciting news with you first.
Criminals are exploiting AI to create more convincing scams
One of the many cool things about the new wave of Artificial Intelligence tools is their ability to sound convincingly human. So, big surprise, criminals are finding ways to use AI chatbots for evil. These ever more sophisticated cyber crimes could spell trouble for unprotected businesses.
3 essential security tools for every business
Your data is one of your most valuable business assets. Keeping it safe should be one of your main priorities. So if you don’t have much security in place, there’s a minimum standard you should be implementing, right now.
Your Guide to Adopting MFA
All businesses should be using MFA as it provides great protection against cyber attacks and other security threats. Our free guide tells you all you need to know.
Microsoft 365 makes Multi-Factor Authentication easier
Multi-Factor Authentication (MFA) is a strong security feature you should be using wherever it’s enabled. Now Microsoft 365 is making it even easier for businesses.
Tech Guide: Learn to talk tech with our IT Jargon Buster
Does IT jargon feel like a foreign language? Although we steer clear of tech talk as much as possible when we’re working with our clients, next time you need help with an IT issue it could save you a lot of time if you have a few words of lingo in your locker.
Tech Guide: Getting to Grips with Email Security
Research by Deloitte found that 91% of all cyber attacks begin with a phishing email. Here’s what you need to know to make your business email as secure as it can possibly be.