We are delighted to have been shortlisted as finalists for the Best Customer Service, and Most Impressive Growth awards at the National Entrepreneur Awards 2017.
A severe vulnerability has been discovered in the latest macOS operating system, High Sierra, discovered by twitter user Lemi Orhan Ergin, which lets anybody log in to your mac with no password.
We see so much helpful information on the internet on how to Recognise and Avoid Phishing Attacks, that sometimes it becomes a bit overwhelming.
This IT Support Costing and Pricing guide is designed to help you develop and initial budget, as well as plan for the costs associated with IT Support.
The name stands for Key Reinstallation Attacks and means that an attacker can exploit vulnerabilities found in WPA2, the industry standard for wireless security.
One of the most important lessons I’ve learnt whilst venturing into the marketing world, is to track your efforts.
There’s no point putting tons of money behind something if you can’t even tell if it’s working or not!
It is reported that a new, rapidly growing threat is spreading through IoT devices as we speak.
As I’m sure I’ve mentioned a number of times already in previous editions of TekkTalk, we’ve been spending much of our time looking at our support process and how we can consistently deliver the very best level of support that we can.
All of that work has now culminated in..
Firstly, don’t be alarmed if you see headlines online that state Google is killing off it’s Google Drive service, it’s not.
Instead it’s slightly tweaking the Windows and Mac desktop clients, and the way they work in 2 different ways. One for home users looking to backup their..
The developing situation in the US has been somewhat of a wakeup call for some businesses.