As more venues open up for face to face meetings, some are introducing their own track and trace systems using a QR code that you need to scan with your mobile phone. But how? This video explains how to scan a QR code with your phone so you are not trying to figure it out when you arrive at your meeting.
More Content

Why you will not be fine on this Cloud9
Fake Flash messages are being used as a cover for a new ‘botnet’ campaign. If you use Google Chrome or Microsoft Edge you could be a target.

Are you really downloading Zoom – or is it malware?
When you think about tools for remote working and chatting online, one of the first names in your mind is Zoom. But its popularity has opened the door for cyber criminals. They’re using its name to steal sensitive data. Researchers have discovered at least six convincing-looking download sites. They’re not the real thing. They’re designed […]

What are the benefits of outsourcing IT support?

90% of cyber attacks start with a simple email. Why?

Tech Tip: How to use browser profiles

The lack of a reliable backup causes a third of all data loss
Your business data is backed up and recovery tools are in place. So, your data is safe, right? Sadly… not always. Here’s why we recommend backups are checked regularly..

Cyber attacks are getting bigger and smarter. Are you vulnerable?
Recently, the biggest ever DDoS attack was reportedly blocked. Worse still, more businesses are being targeted with criminals demanding huge ransoms

10 Simple Tips for Avoiding Phishing Scams: How to Stay Safe Online

Tech Tip: How to Provide Remote Support for FREE with Quick Assist
