Adult Site Visits on Work Computer Lead to Network Infection

The extensive online porn-accessing habit of an employee of a US government department known as the US Geological Survey (USGS) is being blamed for a government computer network becoming infected with malware. 9,000 Pages In an investigation, highlighted in a paper (published online) by the US Office of the Inspector General, it was discovered that […]

Continue reading


How Business Emails Are Vulnerable

Research by digital risk management and threat intelligence firm Digital Shadows has revealed that company credentials and emails that can be easily accessed on the web are making it easier for cyber-criminals to target businesses with attacks. What’s Are The Problems? According to the research, businesses may be suffering targeted attacks because several key problems […]

Continue reading


Tech Tip – Use ‘Near Share’ To Share Files

Windows 10 has a “Near Share” / “Nearby Sharing” feature, similar to Apple’s AirDrop, that allows you to share (by Bluetooth) files, links, photos, and more to nearby Windows PCs that also have the feature enabled. You can enable Nearby Sharing from either Windows 10’s Share dialog, or in Windows 10’s Settings app. Here’s how: […]

Continue reading


Criminals ‘Invest’ More Than Businesses

Research shows that one reason why organisations face constant, serious security threats is that cyber criminals, fuelled by a new cybercrime-based economy are spending much more on cyber attacks than organisations are spending on cyber security. Cyber Criminals Spending and Reinvesting $Trillions! Back in 2017, Gartner predicted that organisations would collectively be spending around $96 […]

Continue reading


90% Of Businesses Blindly Renew Software

A report by Clear Licensing (CCL) has highlighted the fact that most organisations simply renew software maintenance contracts without assessing whether those contracts deliver value. 1 In 10 Companies Check The CCL report (which is based upon research conducted in and May this year), took into account the responses of 100 global participants, and was […]

Continue reading


Social Mapper Can Trace Your Face

Trustwave’s SpiderLabs has created a new penetration testing tool that uses facial recognition to trace your face through all your social media profiles, link your name to it, and identify which organisation you work for. Why? According to its (ethical) creators, Trustwave’s SpiderLabs, Social Mapper has been designed to help penetration testers (those tasked with […]

Continue reading


Online “Pay-To-Watch” Now In Lead

The latest Office for National Statistics’ annual Internet Access and Use report has revealed that there has been a big rise in the number of people using commercial video streaming services. Video Streaming Popular The report shows a big jump from 29% of those watching online video-on-demand from commercial services in 2016 to 46% in […]

Continue reading


Introducing Zyxel Nebula Cloud Control Center

Featured Video Play Icon

Nebula control center provides centralised management of all Nebula wireless, wired and network security devices without the need to invest in addition servers or access controllers. Now available from Mear Technology call us today. #Nebula #NetworkManagement #CloudManagement #MerakiAlternative #RukusAlternative #AerohiveAlternative

Continue reading