3 min read
How using the SLAM method can improve phishing detection
What is the SLAM method and how does it help identify phishing?
Read MoreOur client portal provides all the tools you need to create, view or update your support requests.
For urgent IT support during business hours, or if you suspect anything suspicious call 01314528444 for the fastest response.
If one of our team has asked you to start a remote control session on your computer, use the remote control menu option above.
3 min read
What is the SLAM method and how does it help identify phishing?
Read More3 min read
We often get asked how regularly cybersecurity awareness training should be done. Is annually enough? We don’t think so. In fact, we provide weekly...
3 min read
Have you received a text message from yourself? If you have then you should delete it immediately because it’s probably a smishing attempt.
3 min read
Smartphones and tablets are often the preferred device for communications, web searching, and accessing many types of apps. They’re more portable...
3 min read
Microsoft Teams has become an invaluable tool to many businesses. We can’t imagine getting through the last few years without it. That said the...
4 min read
Multiple monitors and ultrawide monitors look impressive. They also dramatically improve efficiency!
3 min read
Cloud storage. It’s not particularly exciting but it is one of the oldest and most useful cloud computing services out there. Storing files in the...
3 min read
Stolen login credentials are a hot commodity on the Dark Web. There’s a price for every type of account from online banking to social media. For...
2 min read
Protect your business Businesses across Scotland’s capital are coming under increased attack from cyber criminals. The situation At IT Foundations we...
3 min read
Any cyberattack is dangerous, but the particularly devastating ones are those on supply chain companies. These “one-to-many” supply chain...
3 min read
Phishing is the number one method of attack delivery for everything from ransomware to credential theft. We are very aware of it coming by email, but...
3 min read
Changing your number? Check this first There are some important steps to take before you change your mobile phone number that most people don’t think...