Home/Glenn

About Glenn

This author has not yet filled in any details.
So far Glenn has created 19 blog entries.

Windows 7 will soon be significantly more at risk of ransomware

PCs still running when Windows 7 reaches end of life on the 14th of January will be significantly more at risk of ransomware, Veritas Technologies has warned. According to experts, 26% of PCs are expected to still be running the Microsoft software after support for patches and bug fixes end.The vulnerability to ransomware of PCs running unsupported [...]

By |January 10th, 2020|Categories: Uncategorized|0 Comments

The risks of staying with Windows 7 after End Of Life

Windows 7 was released way back in 2009, but there are still around 30% of users globally who still use this operating system.  Windows 7 is one of the most successful OS from Microsoft, and it doesn’t surprise anyone why people would like to stay back. However, its time to move on as Windows 7 is reaching [...]

By |January 10th, 2020|Categories: Uncategorized|0 Comments

Seven security tips for staying safe on an iPhone

Seven security tips for staying safe on an iPhoneiPhones have a reputation for being notoriously secure. After all, they caused quite the kerfuffle between Apple and the FBI because they are, from the FBI’s point of view, too secure. However, don’t let that lull you into a false sense of security. Using an iPhone is not [...]

By |September 13th, 2019|Categories: Uncategorized|0 Comments

10 things to know about Facebook Messenger and surveillance

Find out what happened, what you can do to protect your privacy, and why big tech companies are paying people to listen to youFacebook controversies come and go, but a recent issue involving the surveillance and transcription of users’ conversations seems particularly troubling to government officials, privacy watchdogs, and users. Here are answers to 10 [...]

By |September 1st, 2019|Categories: Uncategorized|0 Comments

Protect your webcam from hackers with these 5 tips

Boost webcam security with these tips to keep spying eyes and listening ears away. There is perhaps no more nightmarish violation than home invasion. Your home is where you feel safe and care for your loved ones. It’s where you’re particularly vulnerable. And as we enter the age of IoT, you open up a new [...]

By |January 10th, 2019|Categories: Uncategorized|0 Comments

How to Identify the Signs Your Computer Has a Virus

Do you know the telltale signs that your computer has been infected with a virus? If not, then you'll want to read this article where we explain how to identify the signs your computer has a virus. Signs Your Computer Has a Virus Causing random crashes, slowing down operation, and draining memory, there is nothing [...]

By |September 6th, 2018|Categories: Business|Tags: |0 Comments

12 Point Server Maintenance Checklist for Modern Data Centers

In an effort to help you keep your servers running effeciently and securely, we've created this 12 point server maintenance checklist that you'll want to use to keep up to date with your server maintenance tasks. 12 Point Server Maintenance Checklist Do you regularly check up on your server? If you don't, it's time to [...]

By |September 6th, 2018|Categories: Business|Tags: |0 Comments

Malware vs Ransomware: What Is the Difference?

Malware. Ransomware. To the average person, they seem like the same thing - they are viruses that can wreak havoc on your computer. In this guide, we are going to compare malware vs ransomware so you know the differences between the two so you have a better idea of how to remove said virus. Malware [...]

By |September 6th, 2018|Categories: Business|Tags: |0 Comments