Messy cables? Time to fix that

Wireless connections are a great thing, as you can connect devices to the Internet and one another without the need for cables. Sadly, many of us don’t use wireless devices much beyond Wi-Fi. As we continue to use an increasing number of devices, all of which use cables, it can be hard to keep them in order.

Worm or virus, what’s the difference?

Computer terminology can be one of the hardest things to wrap your head around. It’s can all seem like mumbo jumbo, with made-up or adopted words. Some of the more confusing terminology comes from programs and software with harmful intent. Is the program infecting your computer a Trojan horse, worm or malware though? It can be hard to differentiate them sometimes.

Don’t be Lazy with Your Passwords

Passwords are more or less the equivalent of keys when it comes to cyberspace. However, passwords can be compromised through hacking, stealing, or even just guessing – which is why password security and integrity is very important. In the same way that keys are used to open different doors, passwords are used to access many areas of cyberspace.

Your Copy Machine: A Serious Security Risk?

It seems that even the most innocuous machines in the workplace can serve as a security threat to companies. According to this report from CBS News, many office copiers save the images they copy on a dedicated hard disk installed inside them. This means that everything from mundane memos to your most sensitive information such as financial statements and contracts are stored – and could potentially extracted. So the next time you dispose of a copy machine, if you’re not sure what’s stored on it and how to get it off – give us a call to help out. To see the news report, watch this video.