Services

Firewalls

The rule is “if your device (computer /tablet /smartphone) has access to the internet, then the internet has access to your device”. Whilst this is necessary to allow information and files to be accessed and shared, control of exactly what and how data is downloaded should be up to the user.

This is achieved by installing an effective firewall. Many users won’t even be aware that they are behind a firewall, but basic versions are built into most broadband modem/routers, however they are not sufficient and additional provisions should be made.

Anti Virus

Every day our Honeypot email trap [A honeypot is a network, computer, or other system designed as a trap, to identify “bad people”] catches that day’s main risks. Increasingly, we are seeing a trend for infected forms of zip files, PDFs, Microsoft Word and Excel documents attached to emails. Upon opening, these will infect your computer.

The contamination of choice seems to be ransomware which will encrypt all the data on your PC. The only way to retrieve your data (decrypt it) is by paying a ransom of anywhere between £200 and £600 at going rates, to clear the virus and restore the most recent backup if you are able, or pay a professional to do it.

Anti Malware

Malware, short for malicious software, is any software used to disrupt computer operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising. This comes in various guises and is delivered in many different ways – the worst being that which is embedded into a normally benign program.

This is because while the main program is being installed, the malware attaches itself to the program and by default gets the same permissions and security level of the operator.

Anti Adware

Adware, is a form of software that downloads or displays unwanted ads when a user is online, redirects search requests to certain advertising websites, or collects marketing data and other information without the user’s knowledge. Adware that does not notify the user and attains his or her consent is regarded as malicious.

Also known as PUPs, is very often installed on the victim’s device without their consent or knowledge, and even sometimes packaged within a genuine program downloaded from a site other than that of the software publisher.

VPN

A VPN is a service that you sign up for online some of which are free but most good VPNs have a small monthly charge. Once you have an account, your VPN service should be “on” whenever you’re online.

A VPN, in action, takes your Internet connection and makes it more secure, helps you stay anonymous and helps you get around blocks and access censored sites.
The key to a VPN is that it lends you a temporary IP address and hides your true IP address from every website or email you connect with.


It’s Virtual…because it’s as if you have a private connection directly to any website or another computer you connect to.

It’s Private…because all your website visits and online activity is between you and the websites you visit.

It’s a Network…because you’re using a special network of VPN servers that covers the entire globe.

Call To Action

Take action today to protect your home, your business or both from the above. Please make full use of our free self-help section, or contact us for a non-committal chat, to request a quote or to discuss a service contract for ongoing preventative and proactive maintenance of all of your devices.

keyboard back

Good management is not knowing what to do when things go wrong, but preventing them from happening.