Archives: Articles
Privacy
Maintaining privacy whilst online is essential in avoiding identity theft and fraud. Apart from these risks, however, there is personal information about you which you undoubtedly do not want to reveal to certain other people.
Safe Linux Use
This page provides advice on some of the most important activities that are particularly relevant for protecting Linux workstations. It includes advice for people running individual Linux workstations (for example, home or small business users).
Viruses & Spyware
Many people believe that smartphones and tablets are not susceptible to viruses, spyware and other malware. This is certainly not the case … in fact the more people that use these devices, and the more apps that are available for them, the greater the level of harmful and criminal activity.
Physical Security
Physical security is just as important as online security in protecting your smartphone or tablet – and yourself – against crime. The compact size of these devices makes them particularly vulnerable to theft, and accidental loss or damage.
Computer Use in Public Places
Using computers, smartphones or tablets in public places is now as commonplace as using them at home or in the office. Whether using your own device – or computers found in internet cafés and libraries – there can be a number of risks if you do not take proper care.
Preventing Identity Theft
Identity theft is a method used to carry out criminal activity, involving unauthorised use of your name and personal details to either steal from you, or commit a crime in your name. Identity theft can be carried out either online, physically using printed documents, or by a combination of the two.
Safe Mac Use
Apple Macs are less vulnerable to attack by malware than PCs. Many people, in fact, believe that Macs are immune to viruses and spyware, but this is definitely not the case. As the use of Macs has increased for both personal and business use, so has the malicious activity directed against them as criminals will […]
Online Gaming
Many computer games are played online against other players over the internet, whether on a console, computer, mobile device or via social networking sites. Most play using an assumed identity, so you are generally already unaware of who they really are. There can also be hidden financial risks in downloading and playing web and app-based […]
Safe Computer Disposal
Computers that you no longer need should be disposed of with great care. The data on your computer can easily be accessed whether you sell, scrap, give away or donate it, and even ‘deleted’ data can be retrieved with relative ease by criminals.
Skype & Other Video Calls
Internet video or voice (VoIP) calls are very inexpensive and convenient, and especially useful for online meetings between two or more parties who cannot – or do not wish to – attend face-to-face meetings, seminars, training sessions and the like. They use your internet connect to make and receive calls.