Email scams continue to be common, but most of them are easy to avoid if you're aware of them. We'll list some of the most common scams and discuss the steps you can take to avoid getting caught out.
By Jon Watson
in Information Security
on June 20, 2023
We're regularly asked to hand over personal data online. Find out about the five principles of fair
By Aimee O'Driscoll
in VPN & Privacy
on April 13, 2022
Egregor is suspected to be closely linked to Maze ransomware. Where did this ransomware come from, and is it a threat?
By Stephen Cooper
in Net Admin
on September 15, 2023
UDP supports all media internet transfers. For years no one had a use for the User Datagram Protocol
By Stephen Cooper
in Net Admin
on August 11, 2022
Τhe best way of securing data is by making it unusable to anyone but its owners and other authorized users with the help of data encryption tools.
By Liku Zelleke
in Net Admin
on November 14, 2022
Wannacry might just be the wake-up call your business needs to put a plan in place to avoid ransomwa
By Lee Munson
in Information Security
on July 20, 2020
Review: SolarWinds NPM - Network Performance Monitor A look at the key elements and capabilities of
By Stephen Cooper
in Net Admin
on September 19, 2023
Tech support scams are on the decline, but they're still a major problem in different parts of the world. Here's everything you need to know about how a tech support scam works, including real examples of what these scams look like from the inside.
By Dave Albaugh
in Information Security
on July 3, 2019
Want to avoid the UPS Scam and other delivery scams? We explain how to remove your data from people-finder sites to prevent scammers from getting your phone number.
By Ray Walsh
in VPN & Privacy
on October 23, 2024