5 Security Steps After a Data Breach

5 Security Steps After a Data Breach

Hi Guys, See below an email that I sent to one of our community today. The person asked us what they should do if they are involved in a data breach. Perhaps this advice will help you as well. Hi Jessica, Thanks for getting in touch. We understand how stressful data...
Fake Security Apps on Google Play Store

Fake Security Apps on Google Play Store

Hi Guys, A new set of malicious apps have bypassed Google security measures and have been available for download on the Google Play Store. This time, these apps are posing as security scanner apps.  Who could be affected?Anyone who uses the Google Play Store could...
The Worst Passcodes To Use On Your Phone

The Worst Passcodes To Use On Your Phone

Hi Guys, The following is a list of the most easily guessed passcodes. This list was originally published by security expert Tarah Wheeler in 2019. At the time approximately 30% of all smartphones could be accessed with one of these twenty passcodes. If you are using...
Is my phone listening to me?

Is my phone listening to me?

Hey Guys, Have you ever been discussing something with a friend and then soon after an ad pops up on your browser for the same thing? You rack your brain, trying to think back to whether you had searched for it online before. But wait… Could your phone be listening to...
An Idiots Guide To Malware

An Idiots Guide To Malware

  Hi Guys, Here is a great article about Malware written by our guest writer Edward Herbert. I hope you enjoy it and if you are happy please let us know by leaving a review. Thanks, Max Roberts. ___ Chances are you’ve probably heard the term malware before. It gets...