Why should you activate two factor authentication…now!

Why should you activate two factor authentication…now!

Why should you activate two factor authentication…now! If there’s one account that’s worth protecting above all others, it’s your email. Not only because it contains your private conversations and data, but because it serves as a gateway to your other online accounts and other users. Two-factor authentication has long been used by the business world to control access to sensitive systems and data – but now with increased levels of phishing and scammers trying to gain access to customer accounts, two factor authentication is becoming essential even on the most basic personal accounts.

Read More

Spilled Water, Coffee or Wine on your laptop? This is what you should do…

Spilled Water, Coffee or Wine on your laptop? This is what you should do…

 

Spilled Water, Coffee or Wine on your laptop? This is what you should do…

In the past few sunny weeks here at Right-Click we’ve seen a dramatic increase in the number of liquid disasters on laptops and MacBooks, mostly involving bottles of water leaking onto machines sharing the same handbag or gym bag. We’re also encounter a few beer and wine-soaked devices too – BBQ’s and laptops don’t mix!

Read More

Scamming & Phishing - How to Spot Fake Emails?

Scamming/Phishing is a massive issue globally for individuals and businesses alike.  In 2014 alone, Microsoft estimated that such scams cost the world a whopping $4 billion annually! Each day,  scammers and spammers send out millions of fake emails, pretending to be legitimate companies in the hope that just one person will:

  • Click the attached link (every click is tracked) this means you and your email address will be an easy target for future attacks/scammers
  • Fill out a form with your email and password -  these details may unlock other accounts (e.g. your email account, social media/Paypal etc) allowing future scams. 
  • Reveal their credit card details 
  • Click a link that takes you to another scam page, where the scammer generates a lead and then earns a commission from a 3rd party etc.

3 Ways to Verify the Identity of an Email   

PayPal Advice - how to spot a fake email

The psychology of phishing - why do we fall for terrible email scams?