Keep Email Safe
Adjusting your security settings for each of your email accounts is a must, but don’t stop there if … Keep Email Safe
Welcome to our tech blog, your ultimate guide to all things geeky. From tech tips and how-to guides to cybersecurity advice and tech reviews, you'll find everything you need to enhance your tech knowledge.
Adjusting your security settings for each of your email accounts is a must, but don’t stop there if … Keep Email Safe
My account was hacked. Now what? These are the critical steps you should take if you discover that … My account was hacked
If you have children, we hope they never experience cyberbullying. But it’s a harsh reality and a type … Cyberbully Protection
If you don’t work in the cyber security industry, some terms may as well be part of another … Cyber Security Glossary
Now that Pokemon Go exploded and turned into a worldwide phenomenon, we start to realise the new threats … Augmented Reality
Small chip, huge leap, here’s why… What is the M1 chip, and what does it do? It offers … Apple M1 Chip
Virtual machines (VM) have become a fixture of many business networks, thanks to their flexibility and cost-effectiveness. But … Why Use a VM?
When it comes to the ones we love, there’s nothing we wouldn’t do to protect them. Here’s a … Block Trackers
IEEE 802.11ax, marketed as Wi-Fi 6 by the Wi-Fi Alliance, is a Wi-Fi specification standard, and the successor … What’s Wi-Fi 6?
Did you know that Google saves a recording of your voice and other audio to your Google Account? … Manage Google Voice
What is a Botnet & How to prevent your PC from being enslaved? Has your computer been acting … What is a Botnet?
If you are wondering if you need Office 365, we have created a list of the benefits that … Benefits of Office 365
Millions have turned to Signal and Telegram. But how much do you know about these rival messengers? Are … Privacy and Messaging
Many years ago when all of this kids and code discussion began, you could have characterised it has … Kids Should Code
The rise of QR codes, designed initially by factories in Japan have been slowly entering the wider world … QR Codes: Staying Safe
2017 saw the biggest ever cyber attack in Internet history. A ransomware named WannaCry stormed through the web, … Ransomware Protection
How to remove old software that makes your PC Vulnerable What are software vulnerabilities? A software vulnerability is … Vulnerable PC
AMD claims the AMD Radeon RX 6000-series can beat both the Nvidia RTX 3080 and RTX 3090…