ECS Computers

What are the Biggest Cyber Security Threats at the Moment?

cyber-security-threats

There are always new threats in cyber security, but it helps to know your enemy – and surprisingly, they’re not all viruses! Here are some of the biggest cyber security threats facing your business right now:    1. Ransomware   Ransomware is a type of malware that takes your data hostage by threatening to delete […]

Top 3 Reasons Why Cyber Security is Important

cyber-security

The importance of cyber security cannot be overstated. As businesses become more and more reliant on their IT systems to serve their customers, it has also become more and more important to protect those systems from malicious actors or viruses. In 2022, a UK Government survey found that 39% of UK businesses had ‘identified a […]

Hackers: Who are they and what do they do?

Ok, so what is a hacker? A hacker is anyone that gains access to a computer system without authorisation or in an unauthorised way. They have a high level of technical know-how but did you know there are different types of hackers? Wait, what are the different types of hackers? Hackers are referred to by […]

Backups: Your Best Data Safety Net

What is a backup? In simple terms, it’s a copy of your data that you save to a second location. This second location could be a physical hard drive, memory stick, or in the cloud via a storage service like Google Drive. Why backup? If your information gets lost, deleted, or corrupted – you have […]

ECS Explains: Wi-Fi

You use it every day, but do you know how it works and that there were different variants of Wi-Fi? In today’s blog we’re going to look at how Wi-Fi works, and some of our top troubleshooting tips. What is Wi-Fi? Wi-Fi is a wireless networking technology that uses radio waves to provide connectivity (internet) […]

Licencing: Using Software Legally

What is a software licence? A software licence is proof that you have paid for the right to access the software, for a particular use. It validates your software install as a legally bought version of the software and typically, if you don’t activate your software within 30 days of installation it will stop working […]

Spoof Emails: How To Spot A Spoof

An email inbox

What is a spoof email? A spoof email is when a person sends an email pretending to be someone else, in order to trick the recipient into handing over sensitive information or money. Sensitive information could be your bank card numbers, address, postcode, phone numbers, answers to security questions or even login information for online […]

Our 6 Top Malware Prevention Tips: Viruses and Malware

If you’ve read our series on viruses and malware, you may be wondering what steps you can take to protect yourself, your family, and your business. Well, you’re in luck! Here are our six top tips: If the email looks suspicious, don’t open attachments or click links! If you get an email that seems suspect, […]

Keyloggers: Viruses and Malware

A lit computer keyboard

In our last blog, we looked at spyware and how it could sneakily record everything you did on your computer. Today’s we’re looking at keyloggers, a variation of spyware with a very specific way of tracking. What’s a keylogger? Like spyware, a keylogger is designed to work covertly with malicious intent, but instead of potentially […]

Spyware: Viruses and Malware

We have seen a lot of cases of spyware-infected machines in our workshop, but what is so secretive about spyware? What is Spyware and what can it do? Spyware is programmed to be covert, gathering information and sending it off to its developer without you even knowing it’s there. Like a secret service spy hiding […]