What are Microsoft Power Toys?

post image

Have you ever thought that there MUST be an easier way to navigate around Windows, split your screen or create a shortcut to a commonly used program or file?  Well, now there is – in the form of Microsoft Power Toys!  Available from the Microsoft website at https://docs.microsoft.com/en-us/windows/powertoys/ simply download and enable the toys you’d like to use! Read more about theseRead more

Issues with your Computer or Laptop Screen? What can be the Cause?

post image

We get regular calls regarding issues with screens. This can be physical issues such as cracks, visual problems such as dim or dark screens or flickering, changes of colouring. Dirt Depending on the screen type and material, they can be like magnets for dirt and dust. Even if the user makes sure that there isRead more

Fraud or cybercrime? Protecting yourself and your Data.

post image

Fraud is when trickery is used to gain a dishonest advantage, which is often financial, over another person. Cybercrime is any criminal act dealing with computers and networks.  Both individuals and businesses become victims of fraud every day. Other words used to describe fraud could be scam, con, cheat and confidence trick. The cost of fraud isRead more

What is Artificial Intelligence?

post image

Artificial Intelligence has been around for many years. It’s a way of computers or machines learning from repetitive tasks or input information and then using the information to make decisions about future tasks on its own. This could be as simple as analysing a shoppers regular grocery bill and sending a coupon for an itemRead more

Fifth-generation network

post image

The fifth-generation network has been discussed for quite a while now, but not all networks or mobile networks can yet provide access to it. It has also been the thing that some people believed had spread viruses and caused other disruptions. Let’s see what 5G is really about, shall we?   It is the newest global wireless standard, following afterRead more

Avoiding Ransomware as part of IT Security.

post image

Ransomware is a type of malware (malicious software) which criminals use to extort money. It holds data to ransom using encryption or by locking users out of their device. A lot of the ransomware attacks that have happened in the past have been linked to poor protection practices by employees or by insecure networks.  Here are a few dos and don’tsRead more

Encryption as part of IT Security

post image

What is encryption? Encryption is the method of converting information into secret code that hides the information’s true meaning. The science of encrypting and decrypting information is called cryptography. Unencrypted data is known as plaintext, and encrypted data is called ciphertext. The formulas used to encode and decode messages are called encryption algorithms, or cyphers. WeRead more

How to protect your data when you’re off on holiday

post image

We all love going on holiday, whether it’s somewhere in this country or abroad. With current changes to the way a lot of people are working, it’s possible that we are storing more sensitive data on our own personal laptops and PC’s. So how can we make sure we keep our devices and data safeRead more

Software to protect your business.

post image

There are many different software packages available on the market to protect your company’s systems, servers and other devices from viruses, hackers and malware. To make sure you’re protected from all types of attacks, we’ve prepared a short article on some of the different packages available to protect your company and what they’ll protect you from!    Antivirus software helps protect your whole system against maliciousRead more

Hard Drive Failures and How to Spot Them

post image

These days, the amount of moving parts in technology equipment has pretty much been eliminated and replaced by circuit boards and chips.  However, there are still a few items left, of which traditional style hard drives are one (DVD Drives and cooling fans are the other main mechanical parts). As the main data storage componentRead more