Protecting small firms from computer disasters
Cart 0

Blog — vulnerabilities

Why to Update Your Web Browser

antivirus vulnerabilities

Why to Update Your Web Browser

Criminals are constantly probing your web browser for weaknesses. Hardly a day goes by that you don't look at something on the internet, so you are repeatedly exposed to threats.

Read more →


Protect Your Cloud Files

backup vulnerabilities

Protect Your Cloud Files

To protect the files you save in the clouds such as Dropbox, Google Drive or Microsoft OneDrive, you need to...

Read more →


Take That, Spectre and Meltdown

protection vulnerabilities

Take That, Spectre and Meltdown

New computer processors foil the Spectre and Meltdown flaws present in almost all current computers.

Read more →


Real Defense against Lightning

protection vulnerabilities

Real Defense against Lightning

Lightning can go right through power strips and uninterruptible power supplies, destroying your computers and appliances. On average the risk is 1 in 8.5 that a house will be struck one or more times in 25 years. Installing a whole house surge protector ...

Read more →


2FA Hacked - Backups Even More Critical

cybersecurity vulnerabilities

2FA Hacked - Backups Even More Critical

Two-Factor Authentication (2FA) is designed to protect you by sending you a text message or calling you when you are logging into a website. A new hacker trick can defeat 2FA.

Read more →