365 Phishing Example

Fresh Tech Logo

How is it possible to be phished from a legitimate Microsoft page? These kinds of attacks are becoming more and more popular. Watch our video below to see how it’s done and how you can avoid it! https://www.youtube.com/watch?v=fYM-NVb73cM

The data security equivalent of leaving your windows open

We all take great care to keep our homes secure.

Yet some business owners and managers don’t have the same attitude towards their business’s data security.

Which is crazy. Because there are a lot more people trying to access your business’s data, than hoping to steal your TV.

Here are four key ways to improve your business’s data security.

Crisis: Your office is on fire

Crisis: Your office is on fire

This is something none of us wants to experience. But it does happen. There’s a small fire in your office. No-one is hurt and everyone is safe. But the damage to your workplace is unbelievable. The flames. The heat. The smoke. And of course, the huge amounts of water used to put out the fire. […]

7 signs that you need a new computer

Repair or replace? 7 signs that you need a new computer It’s always tempting to hold back on purchasing new IT equipment. Yet it can sometimes cost you more if you hang onto equipment for too long. Did you know that if a device is more than 3 years old it’s actually cheaper to buy […]

5 terrifying phishing scams to be aware of

Which of these phishing scams have you heard of

You’ve heard of phishing scams, we’re sure. It’s where criminals send you an email, pretending to be someone else (like your bank), to try to get sensitive information from you. But what about vishing? And smishing? And whaling? These are all forms of phishing designed to steal your information, and ultimately your money.We explore each […]

Old tech isn’t just slowing you down

Old tech isn’t just slowing you down

Computers slow down over time. It happens gradually, so you don’t tend to notice it. Side by side, a 3 year old computer will be so much slower than the latest version. But there’s another big downside of older computers that scares most IT professionals…

Is Misconfiguration Making Your Business Vulnerable?

Is Misconfiguration Making Your Business Vulnerable?

Is Misconfiguration Making Your Business Vulnerable? Cybersecurity attacks on big-name brands or governments are familiar headlines these days. Millions of access credentials are breached, and millions of dollars are lost to ransomware attack. You may think you’re protected, but a single undetected misconfiguration could mean trouble. If you’ve been paying attention, you know no one […]

That’s So 2010: Why Upgrade Your Office Software

That’s So 2010: Why Upgrade Your Office Software

That’s So 2010: Why Upgrade Your Office Software Are you still using Office 2010? It may have served you well over the past decade, but this software reached its end of life in 2020. It’s time to upgrade. Here’s why and what to consider. Software has a typical life span, after which the manufacturer turns […]

Are Your Passwords Compromised?

Are Your Passwords Compromised?

Are Your Passwords Compromised? News of a big brand suffering a data breach is all too common today. But if you don’t get an email from such a company, you could mistakenly be thinking it doesn’t affect you. The thing is, large breaches are happening all the time. Cybercriminals then put access credentials online, and […]

Blocking social media

blocking social media

Social media can be a good thing sometimes. But often it’s can just be an unwelcome distraction. Instead of just blocking social media on your business’s network, here’s something else you can do instead. https://youtu.be/RKKzdfNG6W4