How to Setup Face ID on your iPhone

Posted by Ben Spector on 17-Feb-2019 15:35:25

iphone-x-face-id-1

People hesitant about using Face ID might have skipped setting up this feature when they initially got their iPhones. If you were one of them and you have since changed your mind, here is how to setup Face ID in iPhone X, XS, XS Max, and XR.

Read More

Topics: security, mobile, apple iphone, face ID

Reputation Jacking: Another Trick Up Hackers’ Sleeves

Posted by Ben Spector on 13-Jan-2019 11:41:29

cybercrime-100534917-large

Reputation-jacking is on the rise. Discover what reputation-jacking is and why cyber criminals like to use it when attacking businesses.

Read More

Topics: cloud computing, cybersecurity, data breach, Email Solutions, Business operations, helpdesk, IT Support, business, cyber attacks, cyber threats, security, data protection, business tips

SMBs are Still Common Targets in Ransomware Attacks

Posted by Ben Spector on 17-Dec-2018 12:06:21

shutterstock_552746107

 

Read More

Topics: cybersecurity, ransomware, security, computer security

Adobe Suite Security Vulnerabilities

Posted by Chris Selby-Rickards on 10-Aug-2018 14:46:00

Adobe Suite logos

Adobe Released a Mega Update That Patches More Than 100 Security Vulnerabilities

Five popular Adobe programs were found to be riddled with security holes. Learn about the programs that were affected, their vulnerabilities, and the update created to patch the holes.

Read More

Topics: security, adobe, patches

The 5 Most Costly Types of IT-Related Cybercrimes

Posted by Chris Selby-Rickards on 09-Jul-2018 14:08:22

shutterstock_680075008

Read More

Topics: cybersecurity, data breach, firewall, servers, breaches, phishing, ransomware, theft, anti virus, business, cloud, computers, cyber, cyber threats, cyberattack, cybercrime, fraud, passwords, protection, security, small business, hacking, scams, hackers, computer security

Business Email Scammers Put Behind Bars

Posted by Chris Selby-Rickards on 09-Jul-2018 12:21:36

shutterstock_583338262

Read More

Topics: cybersecurity, Disaster Recovery, Business operations, cyber crime, IT Support, phishing, ransomware, anti virus, business, computers, cyber, cyber attacks, cyberattack, cybercrime, email, fraud, london, office 365, security, small business

What is Phishing?

Posted by Chris Selby-Rickards on 20-Jun-2018 15:22:48

3 Ways Small Businesses Can Take Advantage of Artificial Intelligence

What is Phishing and How to Keep Your Company Safe From Phishing Attacks

Phishing is a type of cyberattack in which criminals essentially trick users into disclosing their personal information such as passwords, credit card numbers and so on. This is becoming an increasingly popular attack vector, with more than 3 in 4 (76 percent) organizations in the UK saying they experienced a phishing attack in 2017, according to figures collated by Wombat Security.

Read More

Topics: cybersecurity, phishing, cyber attacks, cybercrime, email, security, computer security

Cybercrime in Business

Posted by Chris Selby-Rickards on 01-Jun-2018 13:13:38

The Devastating Effects of Cyberattacks on Small Businesses

Cybercrime in Business.

The 5 Most Costly Types of IT-Related Cybercrimes

A report issued by the Internet Crime Complaint Centre shows that cybercrime victims lost more than £1 billion in 2017. Here are the top five IT-related cybercrimes that cost businesses and individuals the most amount of money.

Read More

Topics: cybersecurity, cyber crime, cyber attacks, cybercrime, security

What is Cloud Computing used for?

Posted by Chris Selby-Rickards on 02-May-2018 13:55:41

cloud data backup

What is Cloud Computing used for?

The Top 5 Benefits of Hybrid Cloud Backup

 

Have you switched your company’s backup solution to hybrid cloud backup yet? Find out 5 reasons why you should consider jumping onto the hybrid cloud backup bandwagon.

Read More

Topics: cloud computing, Collaboration, cybersecurity, Business operations, Data, data backup, Backup, chrome, cloud, computers, google, security, small business, software, folders, file share, microsoft, onedrive, data storage, office, 365, files, computer security, filing system, file sharing

Is the Cloud safe?

Posted by Chris Selby-Rickards on 02-May-2018 13:48:25

Is the Cloud safe? How Cloud Service Providers Can Prove Their Data Security Claims

Cloud service providers often promise that they will take good care of their customers’ personal data. Here is how you can make sure they will deliver on that promise.

Read More

Topics: cloud computing, cybersecurity, Data, cloud, security, small business, folders, file share, onedrive, data storage, files, computer security, filing system, file sharing

Welcome to our Blog

We post new content every week!

Hopefully you will find it interesting and useful. We post on a variety of IT related topics including Best Practise advice, Top Tips and How To's.

At SpecTronics we've helped lots of small and medium sized businesses with their IT & Telecoms. Here's just some of the ways we could help you!

  • IT Support including Helpdesk and Onsite engineers
  • Cloud Telecoms/VoIP & Unified Comms solutions
  • A good cuppa and a chat if you just want some impartial IT advice!

So, if IT and all things tech leave you scratching your head, or you simply just don't have the time to manage it yourself Contact us and we can schedule in some time to plan a solution.

Subscribe Here!

Recent Posts

Posts by Tag

See all