Protecting small firms from computer disasters
Cart 0

Blog — vulnerabilities

Protect Your Cloud Files

backup vulnerabilities

Protect Your Cloud Files

To protect the the files you save in the clouds such as Dropbox, Google Drive or Microsoft OneDrive, you need to...

Read more →


Take That, Spectre and Meltdown

protection vulnerabilities

Take That, Spectre and Meltdown

New computer processors foil the Spectre and Meltdown flaws present in almost all current computers.

Read more →


Real Defense against Lightning

protection vulnerabilities

Real Defense against Lightning

Lightning can go right through power strips and uninterruptible power supplies, destroying your computers and appliances. On average the risk is 1 in 8.5 that a house will be struck one or more times in 25 years. Installing a whole house surge protector ...

Read more →


2FA Hacked - Backups Even More Critical

cybersecurity vulnerabilities

2FA Hacked - Backups Even More Critical

Two-Factor Authentication (2FA) is designed to protect you by sending you a text message or calling you when you are logging into a website. A new hacker trick can defeat 2FA.

Read more →


New Computer Flaws Discovered

cybersecurity vulnerabilities

New Computer Flaws Discovered

Newly discovered flaws allow attackers with access to a computer the ability to bypass passwords and read protected data.

Read more →