Author Archives: David Attard
Porn in Parliament – Also in Your Office?
It is not the first time that online pornography has stirred controversy in the UK. The recent government’s decision to automatically opt-in home users to online adult websites was quite controversial with many people saying that it is not up …
How to Protect Your Twitter Account from Targeted Phishing Attacks
The Syrian Electronic Army, a hacking collective which seems to be pro-Syrian government, has been on a Twitter hacking roll lately. They’ve managed to compromise the accounts of many major news outlets, notably the Twitter account of the Associated Press, …
Who’s about to go crazy this March Madness?
Is it your IT administrator who needs to sort out all of the bandwidth issues? Is it your employees who want to access work-related resources on the web and cannot because of people streaming March Madness games?
Control the Harlem Shake in Your Business
The latest craze to go viral on the web is the dance song Harlem Shake, with hundreds, if not thousands of people, gathering in costume to do ‘the shake’ in every conceivable space. Harlem Shake follows hot on the heels …
What the hack?
The past few months have been characterised by a number of high-profile hack attacks. What the hack is going on? (Pardon the pun!) Quite a few things actually:
Stopping the Spread of Malware
We may think that stopping the spread of malicious software is the job of security system vendors. There are, however, a number of things we can do to prevent malware from spreading and causing damage. Let’s look at a few …
7 Reasons Why Software Solutions Are Ideal For SMBs
You’re looking for a product that suits your company’s budget and requirements and the first question that will go through your head is “should I opt for software or get a hardware solution?” Both software and hardware have their advantages …
Take back Control of Your Bandwidth
It is a well known fact that IT Administrators are one of the least recognized and appreciated roles in a company. It is certainly true that people are quick to whine and fret when something is not working, but nobody …
10 Steps to Gain Effective Web Security
Achieving comprehensive web security within the organization is not a trivial task. This is especially so for businesses with limited IT budgets, limited manpower, and other practical limitations. Having a good web security setup in place is a challenging feat …
2012 – The End of the World as We Know It?
December 12, 2012 – the day that’s fated to be the ‘end of the world’. Humbug? Whatever your opinion on the Mayan prophecies, there are more important causes for concern this year that should get you brooding – particularly in …










