Identity theft won’t happen to me!


Said nobody with an understanding of the Internet ever.

No one and I really mean no one is safe from identity theft. The degree and seriousness of the impersonation depends largely on how soon it is detected. Also how determined and efficient the criminal has been.

Steps that can be taken to limit the possibility and likelihood, but as I have said nobody is exempt. Even famous personalities and showbiz stars have fallen victim. Steve Jobs co founder of Apple famously had his identity stolen admittedly in a parody blog, but just goes to show.

Rather than re invent the wheel, here are some links to some of the most horrendous and bizarre instances of recent years. Some truly devastating tales that are literally jaw dropping.

Four Scary Identity Theft stories
Somebody took over my life
Robbed of over $265,000 over four months
Man wrongly branded as a paedophile
Retired nurse fleeced

If you want to protect yourself, check out out out Self-Help page, or if you would like to talk to us about how we may help, or enquire about an ongoing maintenance and security arrangement, please use the contact link at the top of the page, or click here.

keyboard back
If t first you don’t succeed, stop and read the instructions.

Fed up with Microsoft Windows?

Although Windows is the most commonly used desktop operating system in the World, more and more people are getting fed up with the constant enforced updates of Windows 10; Not to mention the myriad of problems they have introduced. These it seems, just for the introduction of more knobs and whistles, when what users want is stability and reliability.

Looking for an alternative is certainly a daunting prospect. There is the Mac option, but in reality this is only available to those with money to spare, as the hardware and software can be pricey. It will also mean starting from scratch; hardware, software and all the peripherals that are not Mac compatible. 

Linux use has been growing year on year as more people dip their toe in the water. One advantage is the fact that far fewer are attacked by hacker criminals, as they will always aim at the largest target. The one draw back is having to get used to a slightly different system.

However, not that daunting, as there is a version that is very similar to the Windows interface. An added bonus is that they come complete with versions of office software, browsers, video and music players and just about everything that a user may need.

PCLinuxOS is distributed as a Live CD/DVD/USB ISO image, that can also be installed to your computer. The Live CD/DVD/USB mode lets you try PCLInuxOS without making any changes to your computer. If you like it, you can install the operating system to your hard drive.  PCLinuxOS has over 12,000 software packages available free from their software repository.

A huge advantage is the fact that it is free. You can download the latest version here; Click Here For PcLinuxOS burn it onto a CD, DVD or USB memory stick and run it on your existing equipment; PC or laptop to see whether you like it or not. Without changing or damaging your current set up in any way.

keyboard back

How I do to stay safe online?

There is no one thing that will keep you safe, besides locking the PC in a room connected only to a power cord. Even then, before too long, somebody will find a way to pass data down the power lines.

Think of protection in layers, rather like an onion, and the more layers that are employed, the greater the security. Simply because it makes it harder to find a way in. If you also use a VPN whenever you surf the net, it will be almost impossible to even know what country you are in, so there is a good place to start.

An example of layers of protection

Layers of security
Not all protection is software or hardware, common sense and diligence also play a part.

Two out of the five layers fall to the individual to implement. Do not use the same password on multiple sites, if somebody finds one they will have them all. Do not open attachments or click links in email without first ensuring that they are legitimate. Finally, never give personal information, passwords or security codes in response to enquiries on the telephone or by email.

The other three are explained and available here on the website, If you are in anyway unsure about installing, running or commissioning any of the above, we are here to help. Contact us to get a competitive price for the implementation of any of these products and services using the contact link at the top of the page.

The advance and use of CCTV

Some of the endless possibilities of the modern CCTV system

All around security

Whilst our main focus is IT security and the protection of data and personal information, it is important to remember that keeping a malevolent actor out of your network, starts with keeping them out of the building.

CCTV in the first instance may well act as a deterrent. However, all it can do if negligence or stealth allows somebody into the premises, is to keep a record of the intrusion. Yet it can also act as an alarm, to forewarn of intrusion or access to restricted areas, and prevent encroachments rather than simply keep a record.

Whilst there are still many analogue systems in operation, the modern variety are all digital HD as standard, have infinite storage capacity and can be monitored by screen, PC, laptop or remotely on hand held devices such as tablets or smart telephones from anywhere that the Internet is available.

As authorised installers of the SystemQ range of security products, we and our associated contractors can integrate CCTV into the overall security solution for homes, offices and workplaces. Irrespective the size of  the architecture, design or location, we have a solution.

Contact us for a non committal discussion about your requirements using the contact link above or click here.

hacker
It takes a lifetime to build a reputation but only seconds to lose it.

Hello world!

The site will help both experienced and novice Internet users to get the most from their resources. and to do it in a safe manner.

The first rule of the Internet is; If your device can access the Internet then the Internet and it’s users, can access your device.

The watchword here is access, and if you don’t have to be on the Internet, then don’t. Routers now can connect in a matter of seconds, so if you are not actively using the net, switch off the router!

A timer switch may be purchased for less than £5, so if you don’t use the Internet between say the hours of midnight and 8 am, then why are you connected at all?

Some may still be unsure of what they are up against whilst connect to this wonderful tool, the Internet. The World and all of the information in it has been opened up to us, most of it free. However, caution must still be exercised.

A person could technically learn to drive a car in five minutes, but they would not be proficient or indeed experienced enough to go out without supervision.

For personal advice or enquiring about an ongoing maintenance and or security arrangement, contact us using the link at the top of the page or click here.

To illustrate, the following video will explain some of the obstacles.