top of page


Understanding the Dell Data Breach: A Closer Look
In a concerning development for digital security, Dell has recently notified its customers of a significant data breach. This incident...
2 min read


5 Social engineering attacks and best practices to avoid them
What is a social engineering attack? Social engineering is the term used for a range of malicious activities that are carried out through...
4 min read


Data backup and storage trends to look out for in 2022
The growth of data has sky rocketed in recent years, with recent predictions showing that the data industry will probably hit a valuation of
3 min read


Log4j Vulnerability updates
What is the Log4j vulnerability? A software vulnerability has been discovered in Log4j (a very widely deployed software library that is used
2 min read


Is your business cyber secure?
Cybercrime has become an epidemic where nobody’s data is safe anymore. With cybercrime skyrocketing since the Covid-19 pandemic
3 min read


Five steps to better cybersecurity
In July, we explore proactive steps that businesses can take to make sure their cybersecurity is as strong as possible.
1 min read


Why anti-malware software alone isn't enough to protect your business
Yes, it’s true. The once trusted and highly revered anti-malware software that has been protecting businesses since the late 1980’s
5 min read


SME attitudes towards cyber-security and why they need to change
SME attitudes towards cyber-security and why they need to change
3 min read

Blog
Welcome to Total IT’s blog, from tech news, Cyber Security, to our top tips and everything in between!
Here you will find our own insightful look on the evolving IT industry.
.png)
Subscribe for blog updates
bottom of page
