T4
Blog and Articles

Is your router a cybersecurity risk?

Products from three major router brands under threat, TheBestVPN finds. Internet routers could be affected by a major security flaw that could let hackers infiltrate your network at home. Research from TheBestVPN found vulnerabilities in routers from some of the biggest device manufacturers around today, including those from NetGear, D-Link and ZTE. The research team found that.
Read More…

World Cup Freebies – Stay Alert

With the World Cup around the corner many people receive emails or see adverts advertising free versions of Excel, or wall charts to help track the progress of the tournament. But how safe are these freebies, and what is the catch when you click on them?   What scams should you look out for? The.
Read More…

Phishing scams – what are they?

Phishing scams are attempts by scammers to trick users into giving them personal information such as passwords, bank details, card numbers. In some cases they encourage the user to make payments to false accounts.   What should you look out for?   The email address – is it the right one for that person? The.
Read More…

Disaster Recovery

What is a Disaster Recovery Plan?   A DR plan is a set of policies and procedures that are in place to protect a business IT infrastructure. It is put in place to enable the recovery or continuation of vital technology infrastructures and systems in the event of a disaster.   Why do you need.
Read More…

Technology is driving business innovation

Business Innovation It has long been seen that the direction a business wants to go in would determine how technology grows and progresses. Historically, small businesses have driven innovation and the creation of new technology. If a company needed an application to work in a specific way, technology would create a system to benefit all.
Read More…

Http vs Https

From July 2018, Google Chrome will begin to mark all http:// sites as not secure due to the security risk such unencrypted sites can pose – What is the difference between encrypted and unencrypted sites? Http (Hyper Text Transfer Protocol) is the method by which data is moved around the web. If you look at.
Read More…

What does your email signature say about you?

There are hundreds of email signature templates available to businesses. A professional email signature should leave a lasting impression, but this should be for the right reasons! Signatures can include dynamic marketing content such as social media icons, promotional banners, award logos and more. You can even opt to have different signature designs for different.
Read More…