3aIT Blog

A little over 10 years after it was first released, Microsoft's hugely popular Windows 10 operating system is now reaching the end of the road. The final mainstream support updates will be released in the next few weeks, after which point devices will become increasingly vulnerable to attack. What are your options if you're still running Windows 10?

You may or may not be aware that the deadline for websites to comply with the UK Online Safety Act has now passed. This means that if they include any adult content (even if that's not their primary purpose), they need properly enforced age checks. Naturally, this isn't going exactly how the government planned...

Ransomware attacks continue to evolve, targeting not just your primary data but also your backups. As more businesses rely heavily on backups for disaster recovery, attackers are focusing on these critical safety nets to maximise their impact. So, how can you ensure your backups remain safe and effective in the face of these threats?

Many of us will have seen news of millions of account details for one service or another being leaked on the dark web. The chances are, at least one account you've ever used is included in this. This guide explains how to monitor these lists for your details using Google's free tool for doing this.

With so called "social engineering" attacks rife, one tactic scammers will use to part you with your money and / or login details is to create websites that look like the site you thought you were visting, but aren't. This month's HowTo outlines a few things you can check if you're unsure whether the site you're on is genuine.

Page 1 of 39