Archives: Articles

Preventing Identity Theft

Identity theft is a method used to carry out criminal activity, involving unauthorised use of your name and personal details to either steal from you, or commit a crime in your name. Identity theft can be carried out either online, physically using printed documents, or by a combination of the two. 

Safe Mac Use

Apple Macs are less vulnerable to attack by malware than PCs. Many people, in fact, believe that Macs are immune to viruses and spyware, but this is definitely not the case. As the use of Macs  has increased for both personal and business use, so has the malicious activity directed against them as criminals will […]

Online Gaming

Many computer games are played online against other players over the internet, whether on a console, computer, mobile device or via social networking sites. Most play using an assumed identity, so you are generally already unaware of who they really are.  There can also be hidden financial risks in downloading and playing web and app-based […]

Webmail

Webmail, such as Hotmail, Yahoo! Mail or gmail – or that supplied by some internet service providers – makes it easy to email using different computers, smartphones and tablets. However, there are risks associated with using internet-based email, some of which are shared with other systems (see Spam & Scam email). 

Skype & Other Video Calls

Internet video or voice (VoIP) calls are very inexpensive and convenient, and especially useful for online meetings between two or more parties who cannot – or do not wish to – attend face-to-face meetings, seminars, training sessions and the like. They use your internet connect to make and receive calls.

Safe Computer Disposal

Computers that you no longer need should be disposed of with great care. The data on your computer can easily be accessed whether you sell, scrap, give away or donate it, and even ‘deleted’ data can be retrieved with relative ease by criminals. 

Software Updates

The software that may be on your computer includes: Microsoft products (either bundled with the Windows operating system or purchased separately) Office (including Word, Excel, PowerPoint, Outlook) Media Player Publisher Project Commonly pre-loaded (when you buy the computer) Adobe Reader Adobe Flash Java Roxio Creator Other applications (which you load yourself from a CD/DVD or […]

Passwords

Your passwords are the most common way to prove your identity when using websites, email accounts and your computer itself (via User Accounts). The use of strong passwords is therefore essential in order to protect your security and identity. The best security in the world is useless if a malicious person has a legitimate user […]

Safe Internet Use

The internet has revolutionised the way we live our lives – enabling us to read the news, enjoy entertainment, carry out research, book our holidays, buy and sell, shop, network, learn, bank and carry out many other everyday tasks. 

Spam & Scam email

email is both an excellent communication tool and also a way that companies can inform you about their latest products and services. However, email is frequently used to deliver unwanted material which is at best, annoying and at worst, malicious – causing considerable harm to your computer and yourself.