Windows 7 says, “It’s not you, it’s me,” ahead of break-up

If you’re still using Windows 7 and loving it, you might not like hearing that the product is nearing the end of its life. Security updates will be cut off in just 10 months: January 2020. That will leave the product untended and vulnerable to new zero-day attacks that are discovered after the support period […]

Read More >


5 ways in which you’re wasting your tech budget

Looking for ways to free up some extra cash in your IT budget next financial year? Here are 5 ideas that might contain the answer. Rethink Private Cloud Now you might be thinking, “Whoa, what? How is security of information and guaranteed sovereignty over our data a waste of money?” True, those are genuine business […]

Read More >


A data breach can cost a CEO’s job – Are you secure?

We’ve been talking about it for years, but this week’s movements at LandMark White show just how seriously the rest of the world takes data breaches these days. Chris Coonan, CEO, has departed with immediate effect citing “…the changing nature of our business and market conditions – combined with major reputational challenges caused by the […]

Read More >


Two Innovations in IT that will change the way you work in 2019

Working smarter not harder is our motto at Computer One, and with that in mind, here are two innovative developments that are going to help you kick professional goals this year and next. 5G The latest generation of cellular mobile communications, 5G is slated for launch in the first half of 2019. 5G succeeds the […]

Read More >


The Busy Executive’s Guide to Information Security in 2019

What Are the Likely Security Threats & Developments for 2019? Cyber threats are always evolving, and 2019 is sure to bring a barrage of new and increasingly sophisticated attack sources and techniques. We expect that 2019 will see an increase in the scope and frequency of cyber attacks, and reckon businesses should prepare for multi-pronged […]

Read More >


Microsoft 365: What is it, how does it work and what are the benefits for your Small to Medium Business?

Back in mid-2017 Microsoft released a product called simply: “Microsoft 365: Enterprise”. Its primary target was the high-end commercial market and that’s where the product has been making inroads ever since. But did you know there’s also a version for Small to Medium businesses up to 300 seats? It’s attractively-priced and it’s packed full of […]

Read More >


Here Are the Main Security Threat Types from 2018

As far as cyber security was concerned, 2018 didn’t get off to a great start. Just days after people celebrated the new year, researchers announced a vulnerability that had been found in basically every CPU processor that had been made in the last 20 years. The most common security threat types in 2018 were malware, […]

Read More >


Email Phishing Scams Are More Sophisticated & Prevalent Than Ever

According to Verizon’s 2018 Data Breach Investigations Report, 92.4% of malware is delivered by email. Up until now, phishing emails have been easy to spot because they come from suspicious email addresses and include poor grammar and formatting – when you think of a phishing scam, you probably picture one of those poorly worded emails […]

Read More >


5 Common Attack Vectors & the Ultimate Solution to Combat Them

An attack vector is the means by which a hacker gains access to your computer or network server, in order to engineer a malicious outcome. Through various attack methods, hackers can exploit system vulnerabilities of all sorts (including the human element, i.e. your staff). In this post, we will explore 5 common attack vectors and […]

Read More >


Using Office 365? You’re probably wasting (some of) your money

Office 365 is a great suite of software, but most business are stuck using only the basics that it offers: Word, Excel, Outlook and PowerPoint. Don’t be fooled by the name. The traditional Office applications are now licensed differently, but Office 365 is so much more than just “Office”. Every version of Office 365 comes […]

Read More >