top of page


Understanding the Dell Data Breach: A Closer Look
In a concerning development for digital security, Dell has recently notified its customers of a significant data breach. This incident...
2 min read
37
0

5 Social engineering attacks and best practices to avoid them
What is a social engineering attack? Social engineering is the term used for a range of malicious activities that are carried out through...
4 min read
41
0

Data backup and storage trends to look out for in 2022
The growth of data has sky rocketed in recent years, with recent predictions showing that the data industry will probably hit a valuation of
3 min read
38
0

Log4j Vulnerability updates
What is the Log4j vulnerability? A software vulnerability has been discovered in Log4j (a very widely deployed software library that is used
2 min read
28
0

Is your business cyber secure?
Cybercrime has become an epidemic where nobody’s data is safe anymore. With cybercrime skyrocketing since the Covid-19 pandemic
3 min read
27
0

Five steps to better cybersecurity
In July, we explore proactive steps that businesses can take to make sure their cybersecurity is as strong as possible.
1 min read
12
0

Why anti-malware software alone isn't enough to protect your business
Yes, it’s true. The once trusted and highly revered anti-malware software that has been protecting businesses since the late 1980’s
5 min read
19
0

SME attitudes towards cyber-security and why they need to change
SME attitudes towards cyber-security and why they need to change
3 min read
50

Blog
Welcome to Total IT’s blog, from tech news, Cyber Security, to our top tips and everything in between!
Here you will find our own insightful look on the evolving IT industry.
.png)
Subscribe for blog updates
bottom of page