It's not uncommon to receive unwanted emails which have managed to work their way through the array of filtering systems in production.  Recently our organisation received such an email - a classic phishing email sent to multiple end user accounts.read more

To be honest, as I'm sure any right-minded individual would agree, downloading videos from YouTube for personal gain is wrong.  However, there are occasions when it is arguably reasonable and possibly even legitimate to do such a thing.read more

A common issue with supporting a primarily Windows based user body, is that thanks to the "always on" expectation emboldened by smartphones and tablets, it can be a constant battle to try and encourage end users to restart their computers with some degree of regularity - yes IT friends, you know exactly what I mean! read more

It’s been eight months since my last blog post, having taken on a new job, been on the receiving end of a full-on enterprise ransomware attack (that wasn’t nice!) and quite frankly experiencing one heck of a baptism of fire - I felt it was time do write a quick blog post tip!read more

As I have mentioned in previous blog posts, I regularly listen to numerous technical podcasts.  A relatively new edition to my listening collection is the information security podcast Risky Business – it’s great!read more