David McNaught - All Business Technologies

David McNaught

Mobile device security

Mobile Device Security: So You’ve Tapped A Bad Link On Your Phone

We’ve all done it – tapped a link, realized it’s not what we thought it was, and then wondered what damage it might cause to our phone. First of all, don’t panic. But then, take action. There are two things you need to be aware of now. And our new video tells you what they …

Mobile Device Security: So You’ve Tapped A Bad Link On Your Phone Read More »

Hacker in a Mask

5 Step Plan To Prepare And Protect Against Cyber Crime

The world economy loses more than $1 trillion to cyber-crime every year That’s a lot of money. And it’s a figure that’s increased by more than 50% since 2018. In 2019, two-thirds of all organizations reported some type of incident relating to cyber-crime. You could make a sure bet this figure rose significantly last year, …

5 Step Plan To Prepare And Protect Against Cyber Crime Read More »

The Data Security Equivalent Of Leaving Your Doors And Windows Open

This is the data security equivalent of leaving your doors and windows open when you leave home. We all make great efforts to keep our homes secure. Yet some business owners and managers don’t have the same attitude towards their business’s and client’s data security. Which is crazy. Because there are a lot more people …

The Data Security Equivalent Of Leaving Your Doors And Windows Open Read More »

3 Ways Your Business Can Be Hacked

3 Ways Your Business Can Be Hacked

Businesses of all sizes are vulnerable to cyber attacks, no matter how careful you try to be. These videos demonstrate how easily your business can be hacked. Watch as a certified ethical hacker simulates a real-life scenario and breaks into 3 computers in just minutes. One of the most common risks associated with business today …

3 Ways Your Business Can Be Hacked Read More »

Phishing Scams

Which of these phishing scams have you heard of?

You’ve heard of phishing, we’re sure. It’s where criminals send you an email, pretending to be someone else (like your bank), to try to get sensitive information from you. But what about vishing? And smishing? And whaling? These are all forms of phishing designed to steal your information, and ultimately your money. We explore each …

Which of these phishing scams have you heard of? Read More »

Scroll to Top
Skip to content