by Adam | Apr 3, 2017 | Blog, Security
We all like to protect our comfort zone and that means that when something familiar changes there’s a level of resistance, no matter how beneficial we’re told the new change will be. Good examples are the new look LinkedIn, changes in Facebook over the years. ...
by Adam | Apr 20, 2013 | Blog
Most online banking access requires two or three pieces of information entering to get access to your account, often generated randomly by a small digital device. Whilst many people sigh about the need for such a laborious process to get at their banking information,...
by Adam | Mar 30, 2012 | Blog
Why do we use contact forms on websites instead of just putting an email address on the Contact us page? It’s not simply to demonstrate how clever we developers are! The primary reason is so you don’t get loads of spam with people phishing. If that sounds like...
by Adam | Nov 30, 2011 | Blog
Many people think that viruses arrive via email, but today just as many viruses are hidden and ready to pounce on websites that you visit. Malicious software can be easily hidden in advertisements on even the most respected sites – even the London Stock Exchange has...
by Adam | Oct 20, 2011 | Blog
Most people refer to individuals who gain unauthorised access to websites, email accounts, bank accounts and online profiles as ‘hackers’. That’s not accurate and, if you’re talking to someone who deals with technology, you may find serious miscommunication going on!...
Recent Comments