Archives: Articles
Virtual Private Networks (VPNs)
Virtual Private Networks all perform the same basic service: providing end-to-end encryption for any data sent through them. This encryption does not stop your data from being intercepted … but merely means that the person reading the content of your data is faced with unintelligible text.
Misinformation & Fake News
The internet is an invaluable tool for finding useful, authoritative information on anything from news and current affairs to DIY, health to history, celebrities to Coronavirus. However, it is also littered with misleading information: that which has been originated and shared by people who are misinformed about the subject, and that which has been deliberately […]
Replacing Windows 7
If you still run Microsoft Windows 7 on your computer, you need to be aware that Microsoft ceased support for the operating system on January 14th 2020. As a result, no longer issues updates, security patches, bug fixes and Microsoft Security Essentials for the operating system.
Oversharing
Oversharing information affects far more of us than we might think. Whether you’ve shared a seemingly innocent photo of your friends or family – or unwittingly given away details of your banking or passport details – you could be revealing information that is invaluable to a fraudster or identity thief.
Your Child and Adult Content
When parents find out that their children have been exposed to online pornography, a typical initial reaction is: “Has my child been traumatised or suffered other harm?” In reality, there is a greater potential for harm from the parent’s reaction, making it essential to not over-react, and talk to the child in a way appropriate […]
Music, Movies & File Sharing
The internet is quickly becoming children’s preferred source of music, films and other forms of entertainment, but it’s quite easy for them to ‘come unstuck’ when downloading or file sharing. There are several reasons you need to make them aware of the potential issues of doing so if they don’t know the rules.
Young People & Cyber Criminality
The dangers to youngsters who spend hours on end on their computer or tablet in their bedroom are well documented and include health and social problems. However, one of the most serious risks is that of breaking the law online by using their coding skills to develop malware or get involved in other cyber criminality […]
Your Information & Facebook
Facebook – the world’s most popular social network – has in excess of 2 billion members around the world. It obtains revenue from advertising: if you ever wonder how products that you’ve shown an interest in pop up in the advertisements and posts on your page, it’s a combination of different technologies used to target […]
Your Connected Home
The number of electrical and electronic items in your home that can be monitored and controlled via your Wi-Fi is growing all the time. These range from security systems and cameras and dimmable lightbulbs to your children’s smart toys. It is even possible to buy a refrigerator which tells you when you need to stock […]
Voucher / Gift Card Scams
A voucher or gift card scam takes place when unsuspecting victims are approached by fraudsters and persuaded to pay bills, fees or debts using iTunes gift cards or other vouchers.