A firewall is a piece of software or hardware that helps to screen out cyber criminals, hackers, malware and viruses that are trying to reach your computer via the internet. It is a network security device that manages and controls both incoming and outgoing network traffic, deciding whether to allow or block specific traffic based…
Phishing is the attempt to obtain sensitive information such as usernames, passwords and credit card details often for malicious reasons. Although this is usually done by cyber-criminals via email, it is now starting to occur on LinkedIn as well. A recent attack on the social media platform shows cyber-criminals have been using existing LinkedIn user…
Come the 31st October 2017, Outlook 2007 will no longer connect to Office 365. This means if your business is using Office 365 and you access your emails via Outlook 2007, you will lose access to your emails via Outlook from the end of October onwards. Although these can still be accessed through an internet…
Working remotely is easier than ever before. The Cloud is now part of our everyday lives at work and at home. It is becoming a popular solution as bandwidth and internet connections become quicker and more stable proving very beneficial to many business’. However, there are still risks of working remotely that you still need…
If you use the built-in Mail app on your iPhone or iPad and use Office365, Outlook.com or Exchange 2016 for email, you may want to hold off installing the new iOS 11 update, or purchasing one of the newly launched iPhone 8 and iPhone X as it’s not currently supported and has a number of…
Mac and Android Malware are on the rise. Malware specifically targeting macOS and Android devices has risen sharply in the last year, according to new research from security company Malwarebytes. Malware is any software or code designed to gain unauthorised access to a computer or network, typically without the owner even knowing. Detection rates have…
Recently, Adobe announced that come the year of 2020, they will officially be ending their support of Adobe Flash. The software company is in collaboration with many technology company’s including Apple, Google, Facebook, Microsoft and Mozilla in order to end the life of the famous Flash Player. Once 2020 hits, the Flash Player will no…
Phishing is the attempt to obtain sensitive information such as usernames, passwords and credit card details often for malicious reasons. This is usually by disguising as a trustworthy entity or organisation in an email. 5 things to watch out for: Spelling mistakes and punctuation. These will always be accurate if the email is legitimate so if…
The Cloud is now part of our everyday lives, at work and at home. It is becoming a popular solution as bandwidth and internet connections become quicker and more stable. Matrix IT can help with advice, installations, migrations, support, cloud backup and more. Economies of scale enable even the smallest business to benefit from cloud technology, with…
Internet based phone systems have been around for years. VoIP systems (voice over the internet) are stable, flexible, and competitive in price against conventional phone systems and can offer a corporate phone system for a fraction of the cost. What is VoIP technology? Voice over IP technology is set of different protocols that work together…