top of page
2 min read
Understanding the Dell Data Breach: A Closer Look
In a concerning development for digital security, Dell has recently notified its customers of a significant data breach. This incident...
280
4 min read
5 Social engineering attacks and best practices to avoid them
What is a social engineering attack? Social engineering is the term used for a range of malicious activities that are carried out through...
380
3 min read
Data backup and storage trends to look out for in 2022
The growth of data has sky rocketed in recent years, with recent predictions showing that the data industry will probably hit a valuation of
340
2 min read
Log4j Vulnerability updates
What is the Log4j vulnerability? A software vulnerability has been discovered in Log4j (a very widely deployed software library that is used
260
3 min read
Is your business cyber secure?
Cybercrime has become an epidemic where nobody’s data is safe anymore. With cybercrime skyrocketing since the Covid-19 pandemic
260
1 min read
Five steps to better cybersecurity
In July, we explore proactive steps that businesses can take to make sure their cybersecurity is as strong as possible.
100
5 min read
Why anti-malware software alone isn't enough to protect your business
Yes, it’s true. The once trusted and highly revered anti-malware software that has been protecting businesses since the late 1980’s
170
3 min read
SME attitudes towards cyber-security and why they need to change
SME attitudes towards cyber-security and why they need to change
44
Blog
Welcome to Total IT’s blog, from tech news, Cyber Security, to our top tips and everything in between!
Here you will find our own insightful look on the evolving IT industry.
Subscribe for blog updates
bottom of page