A website tailored to meet changing business needs

A website tailored to meet changing business needs

In today’s digital age, having a website has become a necessity for businesses of all sizes. As more and more consumers turn to the internet to research products and services, companies must create an online presence that is engaging, informative, and visually...
The offer that is too good to refuse.

The offer that is too good to refuse.

I had a recent call from a customer who was concerned they had been a victim of a scam. They had purchased some branded accessories from an advert, that had appeared on their timeline on a social media platform. I am sure users of this kind of platform will have seen...
Illicit streaming

Illicit streaming

What is Illicit streaming Whilst streaming services like Now TV, Netflix, Amazon Fire TV Spotify etc, provide easy and affordable access to a multitude of legal content direct to your home. The UK government is waging a war against what it calls “illicit streaming...
Blogging for beginners

Blogging for beginners

Blogging for a successful website Content is undoubtedly  king, it provides the opportunity for more touch points than any static website can offer. With respect to successful SEO It is essential when blogging to fit in with the criteria a search engine will use to...
Network Associated Storage (NAS)

Network Associated Storage (NAS)

Setting up a NAS There’s a quick and easy way to add  network associated storage (NAS) to your BT Home Hub 6. This can be achieved by plugging some storage into the USB socket on the back of the router. Either with a USB stick or a USB drive. The home hub only uses...
Sim Swap Fraud

Sim Swap Fraud

Sim swap fraud is another form of cyber fraud set to blight our enjoyment of the equipment that has for many of become part of our everyday lives. This time it’s the humble smartphone and it’s probably not exactly what you think it is. It’s not a virus, in this...
Wi-Fi Hack

Wi-Fi Hack

It has been revealed that the security protocol WPA2, used by most domestic and commercial Wi-Fi networks has a vulnerability which allows the decryption of any data traffic. Wi-Fi Protected Access (WPA,WPA II) became available in 2003 developed by The Wi-Fi Alliance...
Outlook 2016 contact groups

Outlook 2016 contact groups

Quick guide to creating a contact group Use a contact group also called a distribution list to send an email to multiple contacts e.g. a committee, or even just a group of friends, without having to add individual names every time want to email them. Sending a message...
Password Safety and Best Practice

Password Safety and Best Practice

Is your password safe? How many times have you needed a password online and where? Stop don’t answer that question. Because already you are giving away information which may lead to a breach of your online security. It’s not an uncommon practice of one password to...