Latest IT News

email hack

Has Your Email Been Hijacked?

A common complaint by many users in recent months has been spam emails appearing to come from their own accounts. Despite not knowing why, reports of friends, family, and contacts receiving spam email that appears to come from them has worried many people. Some have had their accounts suspended or shut down by their service […]

Read More

Aron Molnar

Aron joins the IT-Pro team

We’re happy to have Aron join us here at IT-Pro. He joins us in August and will be assisting David and Botond with the custom software side of IT-Pro. Aron has a deep understanding of web technologies and specialises in C# MVC. He will be working closely with our growing development team to help bring our […]

Read More

whale attack

Don’t Get Hooked By a Whaling Attack

The executives of your company are the big fish in your sea. Yet cybercriminals think of them as whales. In fact, whaling is a new cybersecurity threat targeting the C-suite level. You’ve likely heard of phishing attacks. Phishers use scam emails or spoofed websites to obtain user credentials or financial information. This might be an […]

Read More

How to Securely Dispose of Old Computers

How to Securely Dispose of Old Computers

Getting new computers for your business is exciting, but what happens to the old ones? Depending on the age, some people sell them, others throw them out. That’s the easy part. The problem is the sensitive data on them. There are passwords, account numbers, license keys, customer details, medical information, tax returns, browser history…. the […]

Read More

Handle with Care: Sending Data Securely

Handle with Care: Sending Data Securely

In our digital economy, we send and receive information quickly online. The Internet offers immediate communication with colleagues, clients, vendors, and other strategic partners. Yet we shouldn’t prioritise convenience over data security. What data do you send in a day’s worth of emails? Sensitive data you send might include: personally identifiable information (PII); credit card […]

Read More

How to Spot Email Spoofing

How to Spot Email Spoofing

The number of emails we get daily can be overwhelming. We could be excused for not looking at them all closely well, almost. Except that not taking care to review emails for signs of spoofing could be a real risk to your business. Learn about email spoofing and how to avoid it in this article. […]

Read More

Advanced Email Threat Protection

Advanced Email Threat Protection

Zix Email Threat Protection provides multilayered filtering that permits legitimate email while blocking malicious threats such as phishing, impersonation, malware, ransomware, and spam-type messages—all automatically. Benefits: Allows good email through, keeps bad email out Automatically guards against phishing, spam, threats, and email compromise Strong defense against emerging threats Keep employees efficient by reducing unwanted emails […]

Read More

email struggles

Struggling with Email Overload?

Email has allowed us to send and receive messages more easily than ever before. While this is a good thing, it can lead to problems. You may receive dozens or even hundreds of emails in a day. At this point, it feels like you’re wasting your entire day dealing with those incoming messages. Even worse, […]

Read More