Blog

 

Trojan Horse, Trojan Virus - Help I need a decent Antivirus!

A Trojan also known as Trojan horse, is a malicious software scam designed by criminal gangs and their hackers to disguise as real software to gain access to devices. Cyber-criminals intentionally use Trojan technology to spy on or hack into victims.

Users are conned into downloading this software by some attractive social media add on which then enables itself and gets to work. Using this backdoor, they are able to start to gather all of your important sensitive information.

Read the rest of entry »

Free Antivirus Software - An Affordable Friend or A Costly Foe?

A lot of people try going without an antivirus or they use a free antivirus such AVG Free. However there are several serious factors you need to consider before siding with free antivirus software or none at all.

Read the rest of entry »

Internet Safety - Building The Right Online Reputation

It’s all about building a real digital presence, an online reputation that embraces the best practices of internet safety - building an online presence that lets you take advantage of the internet and not let the internet take advantage of you.

It’s just like life, it requires discipline to build it properly and yet you can still have the best fun.

Read the rest of entry »

What is ransomware & Why you need to pay for Antivirus Software

Everyday thousands of people find their computer locked down by ransomware – usually with the message “Your files are encrypted, to decrypt your computer you have to pay £500 GBP”.

You are then given only a few days to pay, after which the price goes up to £1,000.

After a week of no payment, you are warned that the decryption key will be irretrievably destroyed with no further chance of recovering your files ever again.

Read the rest of entry »

What is Malware and why you need Internet Security Software

Malware is malicious adware created by cybercriminals in an attempt to harm your computer and access your private information. Once your computer is infected with malware, cybercriminals are able to infiltrate your system – often without you even knowing.

Read the rest of entry »

Internet Security - Why buy F-Secure Freedome VPN?

VPNs are a must have for anyone using a device to access the Internet. They provide Internet security by extending a private network across a public network. This allows people online and branch offices to safely access, send and receive data across free public networks, who doesn’t love free Wi-Fi – as if their device were directly connected to a private network.

Read the rest of entry »

Parental Control Software - What is it and why do you need it?

Parental control software is your right-hand man when it comes to internet safety. It allows you to monitor, control and limit your child’s online activity, keeping them safe and secure online.

Most devices come with parental controls, but these can be easily disabled.

Read the rest of entry »

Internet Safety - France bans Cellphones in Schools for ages 6 -15

It’s no longer a request, France is officially banning the use of phones in schools for children aged 6 – 15 from September 2018.

Presidents Macron and especially his wife Brigitte, a former teacher herself are particularly eager to see this law enforced.

The proposed ban was a key part of his presidential campaign. So there’s a good chance it will receive international support when it comes into full force.

Read the rest of entry »

Let’s face it, the internet can be a nasty place

Between predators, malware, explicit content, and other less than well intended content, kids don’t have much of a chance of escaping the worst the internet has to offer. 

Read the rest of entry »

Cybersecurity is a Business problem, not just an IT risk

Traditionally, cybersecurity issues fell on the shoulders of the IT department, however, with business becoming more and more digitised – it’s become more of a business issue.

Now more than ever, businesses need to shift their mindset from questioning “if” their business will experience a cyber-attack to “when” will they be threatened and “how” will they respond. There must be a cyber security procedure in place.

Read the rest of entry »

Subscription

Get the latest updates in your email box automatically.

 

 

OR CALL NOW
+353 (0)1 908 1588

Search

Archive