Profile cover photo
Profile photo
Prevos Solutions
Excellence in IT Services in the West of Ireland
Excellence in IT Services in the West of Ireland


Post has attachment
Choosing a Domain Name for your Business Website

You have a great name for your business, but the domain name you want for your website has been taken by someone else. What are your options?

If you’re lucky, you have a very unique, brief business name and you were able to secure an exact domain match. If this is not the case however, all is not lost. Simply because the domain name you want has been taken, you can still have a catchy and effective domain name for your business website by employing a little creativity. There is no requirement that the domain should exactly match the business name.
In the event, that your business name is long, it’s likely that you can secure an exact domain match, e.g. if the business is called Irish Industrial Welding Services, you might want the domain to be
However, imagine a prospective customer typing this into a browser, or emailing you, e.g.
They are likely to make a spelling error with such a long piece of text and might give up in frustration.
On the other hand, you can get creative with a domain that is short and catchy, like, BestIrishWelding, or even You could even register a few domains with relevant keywords that all point to your website, to increase the likelihood of your website appearing near the top of a list of search results. (A caveat here: this is just one factor in Search Engine Optimisation or SEO. Other factors include: a “mobile responsive” website; relevant keywords placed throughout the website; well written content, fast page loading, and many more.)
Even if you have been using something like the first domain name in the above example for some time already, you can still register one of the shorter names, and forward it to your website and email, making it easier for your customers or prospects to contact you.
Other tips to keep in mind when choosing your domain name:

1.Try to avoid digits and hyphens. The likelihood of errors increases if people enter ‘five’ instead of 5 for example, and might forget to enter the hyphen.
2. If your business is region specific, it might make sense to include the town name in the domain if possible.
3. If Ireland is your primary market, you might consider a .ie domain. According to the IEDR, a .ie domain has a higher chance of appearing in the first page of an Ireland-specific internet search, and “…is one of the safest domains in the world, with lower instances of cybercrime and cybersquatting than other domains.”
4. Set up auto-renewal with your domain provider, and link to your credit card. This way, you won’t need to remember to renew your domain annually, avoiding the unpleasant situation of your website and emails going down, which may cause your customers to shop elsewhere if they can’t contact you!

Whatever stage you’re at with a domain name, the good news is that you always have options to optimise it. If you have any questions on this, email me directly at and I’ll be happy to advise.
Add a comment...

Post has attachment
Excellent Wi-Fi Network - Everyone's Dream

Wi-Fi can be a wonderful thing: Your smartphone or laptop automatically connects to your Wi-Fi network, even if you’ve previously connected to a different network elsewhere. The signal is strong, and stays this way, even if you take your device around your building in the course of your work. If there is more than one access point, your device seamlessly connects to the closest one to you, automatically and seamlessly.

I’ve just described the perfect Wi-Fi network. As you may have experienced, the reality is that it doesn’t always work like this! Maybe it connects, but then disconnects after a while. Perhaps the signal looks strong, but you can’t browse the internet or access email. Or maybe you can connect, but the internet is hair-pullingly weak! (Yes, Oxford English Dictionary, I just invented the adverb hair-pullingly, please credit me when you eventually list it😉). So, what makes for an excellent network? Here are 6 important areas to cover:

When your ISP (Internet Service Provider) installs your broadband service, they provide a basic router which generally includes wireless capability which allows a few devices to connect to it, as well as basic firewall protection, which gives a minimum level of protection against cyberthreats. This is usually fine for a home, or small office. If however, you have an organisation of 10 or more people, have a large building which needs Wi-Fi throughout, or have guests who require access, you may require a more robust solution like a SOHO (Small Office/Home Office), or Enterprise class router. Starting prices for SOHO routers are quite reasonable, and you can expect to pay more for higher specifications devices, depending on security requirements or number of users who need to connect. Better quality routers also provide increased security, and are generally more reliable, maintaining a robust connection without requiring an occasional reboot, as is the case for some entry level devices.

Access Points
Routers generally have built in wireless capability, to enable several devices to connect. However, if the physical environment is large, or is comprised of 2 or more floors with several rooms or other obstacles to signal like elevator shafts etc, 1 or more wireless access points may be required. These access points are physically connected to the router via data cable and mounted in areas where coverage is needed. Depending on the building construction and numbers of access points, it should be possible to walk through an environment with a mobile device such as a phone or laptop, and not lose network access, as the device automatically connects to the closest access point in it’s vicinity.

It is possible to connect to a wireless network but not receive broadband coverage. This usually means there is an issue with the broadband itself, either at the device or ISP level. This can sometimes be tricky to trouble shoot, so call us if you need any help with this.

Guest Network
If you organisation sometimes has guests who wish to use your wireless network, its best practice to have them connect to a separate network from yours, to maintain your own IT security, and to prevent your network from being infected by any malware which happens to be on the guest’s device. Setting up a guest network is fairly straightforward and is something we recommend to all clients with occasional Wi-Fi guests.

Clear Network Naming
When setting up wireless networks, the router software assigns a default name. This can and should be changed to a recognisable name so that its clear to users which one to connect to, especially if there are several networks to choose from.

Careful Password Management
Having strong password for your wireless network is advisable, as well as changing this periodically. It is an extra precaution from anyone who guesses an already weak password and their browsing activity might intentionally or accidentally damage your network.

Once you take these 6 areas into account when creating a wireless network (and assuming you have a minimally acceptable download speed from your broadband provider), you should have a great Wi-Fi network which allows your staff and customers to connect while keeping your network secure. Questions? Give us a shout at 091 395413 or drop us a line at and we’ll be happy to provide some pointers.

Add a comment...

Post has attachment
Prevos Solutions Proud to be IT Partner to Galway International Arts Festival for 2017

For the second year running, Prevos Solutions are providing IT Support for the Galway International Arts Festival (GIAF).
As a Festival Patron in 2017, Prevos Solutions manages GIAF’s IT infrastructure, enabling it to focus on it’s tremendous work as an internationally recognised arts festival.
Among the various services which Prevos provides to GIAF include:

Structured cabling and physical network maintenance: Installed data cable in the box office, as well as comms cabinet, switch, router, and other networking components.
Computer support: Addressing issues such as connectivity to network/printers, email, and general performance issues.
Phone support: Ensuring that the network supporting the Voice over Internet Protocol (VoIP) system enables clear and reliable phone communications.
Critical response: Providing fast, efficient response (both onsite and remote) to IT incidents impacting on organisational performance year round, and especially during the busy Festival period.
Hardware/software procurement and installation: Leveraging it’s enterprise solution distributor network, Prevos identifies the correct solution for GIAF, whether hardware, software (or a combination of both), and implements in a quick turnaround timeframe.
“We are very excited to continue our support of the amazing cultural phenomenon that is the Galway International Arts Festival”, said Kevin Newell, Managing Director of Prevos Solutions. “We are honoured to be selected by GIAF to support their IT, having done this for the 2016 festival also.”

Galway International Arts Festival is a major cultural organisation, which produces one of Europe’s leading international arts festivals; develops and produces new work that tours nationally and internationally; and presents a major discussion platform, First Thought. The organization has played a very significant role in placing Galway firmly on the map, as both a key cultural centre for the arts and a cultural tourism destination on the Wild Atlantic Way. It now looks forward to playing a central role in the European Capital of Culture 2020 designation awarded to Galway.

“Prevos Solutions is a valued partner to the festival for the past 2 years” said Gerry Cleary, Financial Controller of Galway International Arts Festival. “The support they provide is excellent, and they are there when we really need them, to ensure that the show can quite literally go on”.

Prevos Solutions are a Managed IT Provider offering superlative IT Services to organisations throughout Ireland. Services provided include: Network support; Cloud Services; Telecommunications; Email/Domain Services; IT Support Solutions; and IT Sales. High profile companies trust Prevos Solutions to manage their critical IT requirements, including Galway International Arts Festival, P&O Maritime; and Western Motors.
Add a comment...

Post has attachment
7 Ways To Stop Spam Email

Spam (or junk/unsolicited email) has existed for as long as email has been around. It can be frustrating, but yes, it can be managed quite effectively.

Largely everyone gets some spam, but many users report getting so much that they have difficulty in identifying legitimate email messages in their inbox. Spam can range from merely annoying, where you get an email offering unsolicited goods or services, or more malicious, where you get an email containing dangerous malware, which can impact your entire network.

Email programs, such as Gmail, have in-built spam filtering which (in theory anyway) routes most spam to a junk or spam folder.

Here are 7 steps you can take to reduce spam:
1. Mark as junk: While it is tempting to just delete spam from your inbox, this does nothing to reduce the likelihood that you will receive similar mail in the future. You should right click the errant message and select ‘Mark as junk’. This increases the chance that this and similar messages are properly routed to your junkmail folder in the future.
2. Ensure your antivirus is up to date, as this has tools for reducing the amount of spam you receive.
3. Newsletters: If you currently get lots of emails from sources to which you previously subscribed, this is not technically spam, as you gave permission to receive this at some point. If you no longer wish to receive these emails, the most effective method is to simply unsubscribe. Most newsletters have a very easy and clear unsubscribe feature built in the message itself. However, some spam may trick you to click an Unsubscribe link in order to confirm your email, so only unsubscribe to legitimate newsletters you would have signed up with in the past.
4. Rather than opening potential spam messages, use the Preview pane in your email program to preview messages without opening them. If you need help with this, drop me a line and I’ll show you how!
5. Don’t reply to spam, or click any links contained therein. You might be downloading a nasty piece of malware. If you accidentally open the message, this is OK, as long as you don’t click on any links.
6. Be careful where you browse: Even reputable news and social media sites might contain links to ‘spammy’ content. Minimise your browsing to trusted business and new sources, and avoid clicking those “You’ll never believe what this…” type clickbait articles.
7. Even if after you follow these steps, and you still get a lot of spam, it might be appropriate to start from scratch with a new email address which you strictly share only with trusted contacts.

Now, even if you cut down on spam so that 95% of it is directed to your junk folder, you still need to manage the legitimate emails effectively! If you have any questions on any of this, please get in touch at 091 395413.
Add a comment...

Post has attachment
Please hack my network! What an XP computer tells the world

Regular readers of this blog are likely aware that Microsoft ended support for Windows XP in April 2014. However, there are other systems which are also no longer supported…

When Microsoft releases an Operating System (OS), like Windows 7, they also publish the lifecycle under which the OS will be supported. Support is generally available for about 10 years from initial launch, which is well past the expected lifecycle of a computer or server, as these are rarely very productive after 7 years.
If you are running any of these Operating Systems, you are still receiving security updates as part of Windows Updates:

- Windows 7
- Windows 8/8.1
- Windows 10
- Server 2008/2008r2
- Server 2012/2012r2
- Server 2016

However, if you are running any other Microsoft Operating System, such as Vista, XP, or Server 2003, your entire network is exposed to security breaches, and we strongly advise these machines are replaced immediately. We can’t emphasize this enough, and if you have any concerns about your own state of protection, please call us today at (091) 395413.
Add a comment...

Post has attachment
8 Reasons Why Your Computer is Slow (And What to Do About It!)

A slow-running computer can be hugely frustrating when you’re trying to get important work done. Let’s review some reasons why this might be, and what you can do about it.

1. Antivirus
While its critical to have a good quality antivirus program on your computer, this may sometimes be the cause of slow performance. When it works correctly, this software intelligently guards against potential viruses, while allowing programs you trust to operate unhindered by repeated security checks. However, it can also be a bottleneck if it is preventing a safe program from working effectively. In addition, if more than 1 antivirus program is installed, this can play mayhem, as both agents check the same programs repeatedly, which can really slow things down.
HOW TO FIX: If antivirus repeatedly warns about a program you believe to be safe, select the option to ‘add to safe/trusted list’. Also, ensure only 1 good antivirus program is installed.

2. Too Many Browser Windows
It’s very easy to open multiple browser windows or tabs, which can make it easier to get work done. However, bear in mind that some websites use a lot of processor speed/memory. This can then throttle computer performance; causing everything on your computer to slow down.
HOW TO FIX: Minimise the number of browser windows/tabs you have open at any time to consume the least amount of computing resources.

3. Too Many Applications Running Simultaneously
Like having too many browser windows open, having too many programs running can significantly hamper your computer’s performance.
HOW TO FIX: Try to limit the number of applications you have open at any one time, and fully close all programs as you no longer need them.

4. Not Enough RAM
Most computers come with 4Gb of RAM as standard. This is sufficient up to a certain point. However, if you are using software which requires more RAM to run effectively, you may find that your computer is slower. This is becoming more commonplace, as new updates to software tend to use more and more RAM.
HOW TO FIX: Install additional RAM. This is relatively inexpensive and is a fairly quick operation. It can be easy to get wrong however, so best to leave this to an expert IT person.

5. Programs Hogging Processing Power
Some programs which do not appear to be open (i.e. running in the background) may actually be using a lot of computing resources, which drains your processor’s power for other programs.
HOW TO FIX: Open Task Manager on your Windows computer by pressing the Ctrl, Alt, and Delete keys simultaneously. Select Task Manager from this list, and look in the Background Processes section. You can sort the list by Memory or CPU, to identify the culprits consuming the most resources, then click ‘End Task’.

6. Hard Drive Nearly Full
Regular readers of this blog are probably aware of our aversion to storing data on your computer’s hard drive. Hard drives can fail at any time, so storing files ONLY here is asking for trouble, which is why we recommend a cloud storage service like Google Drive or similar as your primary storage. Therefore, your hard drive should remain mostly empty. As it approaches capacity, this can cause performance problems, so the visual graphic of your hard drive should always be blue as shown here. (As it approaches capacity, the bar turns from blue to red).
HOW TO FIX: Try not to store any files on your computer by using a remote storage service to keep your hard drive as empty as possible (which will also save you from heartache if your computer becomes damaged or stolen).

7. Processor Too Slow
The speed of the processor at the heart of your computer’s hardware is a major factor on overall speed. The processor on a computer at least 5 years old are well behind today’s new machines.
HOW TO FIX: If your computer/laptop is over 5 years old, the best recommendation is to replace your machine, as replacing the processor would still result in a older machine with an increasingly likelihood of other performance issues.

8. Virus or Malware Infection
Even if you have a good antivirus program installed, it is still possible to get a virus or malware on your computer. Think of it this way: Even a good security guard may be tricked by someone who requests access to a building with fake credentials. By the same token, we are all capable of being fooled by an email which requests we click on a specific link which ends up being harmful. Some of this harm is done without the user being aware, and a virus may slow down your computer without any other outward signs that it is there.
HOW TO FIX: Run a scan of your computer using antivirus or malware detection software to rule this possibility out.

In addition to the above, there may be other reasons why a computer is slow, which may not be related to the computer itself, such as network or broadband connectivity issues. If IT performance is an issue for your organisation, call us today for a free IT audit at 091 395413.
Add a comment...

Post has attachment
When Should You Replace Your Server?

As the cost of replacing a server can be substantial, many organisations want to delay this for as long as possible. While this is understandable to ensure the maximum return on investment, it pays to be aware of the hidden costs of delaying the process for too long.

Here’s the Deal:
Server replacement cycle best practice is approx. 5 years, although this can be stretched to 7 years in some cases. We have found that after 5 years, general performance declines, and it takes longer to do various tasks. This translates into longer periods where your team are waiting for specific programs, file directories, or email. And as time is money, you can easily calculate the accumulated waiting time per person each week as a direct cost of the aging server.
If and when you do upgrade, it’s important that this is done right. We have seen too many cases of servers which were not properly configured from the start, which meant that it’s performance was seriously impacted, and the maximum return from this significant investment was not being obtained.
If your Server runs the Microsoft Server 2008 Operating System, Microsoft’s mainstream support for this OS ended in 2015, although extended support is available until 2020, which includes security updates. Therefore, now is the time to start planning to migrate to a new system.

Maximising your ROI – Ensure you account for these major functions

Get Virtual
Employ Virtual Machine (VM) technology where warranted. A VM is essentially a server in the form of software, i.e. not a physical thing at all. A VM can be configured as a server that is inside the actual server. The advantage of this is that the VM can be rebooted without requiring the physical server to be rebooted, and uses less resources also. Other uses include: As a platform to run older programs which are incompatible with the physical server Operating System. Employed intelligently, this highly useful technology also let's you do things like testing specific Windows upgrades to ensure your existing applications won't be adversely affected.
Domain Controller
Setting up the Domain Controller and Active Directory is a one time task, IF ITS DONE CORRECTLY. This feature enables users to login to the server, have access to folders based on pre-set permissions levels, access their email, and access printers on the network.

DHCP, or Domain Host Control Protocol, enables a server to assign IP addresses to all devices on the network. IP conflicts (i.e. 2 devices with the same IP address, causing some devices on the network to be unavailable) may arise if there are DHCP issues.

In the past, Servers included a mail server. Best practice currently however is to move emails from the server to the cloud. This way, emails are always available in the event of a server outage, and are backed up in realtime, and not exposed to server damage or encryption.

That’s Not All – Here Are A Few Other Areas To Consider
Our leasing partner, Grenke, offers excellent leasing options to small businesses, as an alternative to a large upfront purchase cost. The approval process is quick, and leasing is an effective way to manage cashflow.

In some cases, organisations avail of a hosted server (i.e. you access your server in a data centre over the internet), and have no physical onsite server. Advantages include very high uptime, a manageable monthly cost (you are in effect renting space on a server), and scalable pricing, where you only pay for resources that you use.

Disaster Recovery
As a server is often the backbone of your IT, having a good disaster recovery plan in place is key. This will ensure that you have a plan if your server becomes damaged or destroyed, so that your organisation is minimally impacted. We did an article on this in February which covers the high level points.

By now, you know that upgrading your server is critical to get right, and should only be done by experienced professionals. Yes, that's right, just like us! Seriously, we want to help, even if we're not your provider, so go ahead and contact us on number 091 395413 or email me directly, if you have any queries about this.
Add a comment...

Post has attachment
Helping Customers Choose the right Microsoft Product

As an approved Microsoft reseller, customers choose us to resolve their IT challenges with software which meets their business requirements.

Microsoft have a really nice website. They have lots of wonderful content on their products, and really useful case studies of their many applications. You can even purchase the products directly. In some cases however, they require customers to purchase via an approved reseller like ourselves. Even when you can purchase directly, it might be advisable to let an experienced guide do this for you, and it’s important that the right option (and there are LOTS of options!) is selected to ensure it works exactly as expected.

I believe this is in the best interests of the customer. With our extensive product knowledge and experience in provisioning Microsoft products for a wide variety of organisations, we ensure that Irish SMEs quickly get the right product for their requirements.
In the past month alone, we’ve helped Legal Technology companies, HR Consultants, Architects, and Solicitors, by selecting the right product for their business requirements, and implementing it so they can get on with their business. Here are some examples of how we helped these customers.

Windows 10 Professional
We were contacted by a business who required some licences of Windows 10 Professional to upgrade their Windows 7 PCs. This might seem straightforward, but the licence can be procured in a few different ways, e.g. an ordinary licence, or one which can be managed through a Microsoft Volume Licencing Account. The latter is used by customers who tend to purchase a predictable amount of Microsoft products each year.
PRO TIP: If you ever purchase a computer for your business (and let’s face it, even home computers eventually become business computers thanks to remote access technology), always ensure that it includes Windows 10 Professional, rather than Windows 10 Home Edition. They are similar in most areas, except for advanced networking, where the Professional version contains key features, not included in the Home edition, required to make this work effectively.

Office 2016
This is the one-time purchase licence of Microsoft Office Productivity suite, including Word, Excel, PowerPoint etc. Again, there are a few purchase options, so not a walk-in-the-park in terms of deciding on which option to choose. For example, the Open Licence option costs more than the Retail version. Key advantages in the Open Licence version include:
- For a nominal additional amount, you can avail of future new product releases
- You can downgrade to earlier versions. At first glance, this seems counterintuitive: “But Kev, why would I want an older version than the latest release?” However, this is required sometimes for some customers legacy programs which might require an older version of Office to run effectively.

Exchange Online
Microsoft’s excellent email service is increasingly selected by Irish businesses to more effectively manage their emails. Now technically, customers can purchase Exchange Online themselves through Microsoft’s website, but to be honest, setting up can be a little tricky. When you throw into the mix additional users, and mailboxes or aliases (our earlier blog post explains these concepts), what starts with tricky can end up overwhelming the less experienced! Of course, we know all the ins and outs of this stuff (being the IT geniuses that we are 😉), which is why customers are happy to leave this to us.

Office 365 Business Premium
Customers are increasingly choosing this product, which is a monthly subscription to Microsoft Productivity suite, including Word, Excel, Outlook and Powerpoint. This automatically receives the very latest software releases, which would not be the case when you buy the retail licence (Office 2016) version. Not only this, but it also includes Exchange Online, the excellent email hosting product, as well as OneDrive, so you can securely store your documents on the cloud.

So if you are trying to decide on the right software for your business, give us a shout, and we’ll get you on the right track.
Add a comment...

Post has attachment
5 IT Security Best Practices

The terms computer viruses, ransomware, and trojan horses frequently evoke fear and dread on the part of business owners and operations managers.

This may be due in large part to a belief that since they probably can’t understand how they work, by default, there’s nothing they can do to protect their organisation. The good news (and it’s actually pretty good!) is that not only can you increase your IT security, but you can do this without needing an in-depth knowledge of the technology that cybercriminals use to get into computer systems.

There will always be people motivated by financial reward (or even by reputation among their peers), to break into computers over the internet and steal sensitive/compromising data, or remotely “lock” up all data on your system. Any computer connected to the internet is a potential target.
Therefore, just as you take precautions to secure your house along multiple levels (e.g. locks/alarms/monitoring etc.), the same mindset must be adopted for your IT system. Be advised, however, that even if you follow each of the 5 IT Security best practices outlined below, it’s not an ironclad guarantee of safety, but the negative effects of an attack should be minimised. We even threw in a 6th bonus tip, so make sure you read all the way through!

The first line of defense is good Antivirus software (our preferred product is from ESET). Features to look for include an inbuilt firewall, malware protection, and an email spam filter. Antivirus should warn about security problems on websites you visit, block most incoming threats, and also provide protection against spam and emails containing potentially harmful links.

Passwords are a frequently ignored method of securing your computer and systems. An easy to guess password makes it more likely that someone can guess it and steal/compromise your data. This article from Entrepreneur contains a great illustration on this problem. Bottom line, make all your passwords are hard to guess (avoid examples like birthdays, pet names, and favourite music/places etc.), and for extra protection on your most important systems, turn on 2 factor authentication. If you have any questions about this, drop us a line!

Maintain up to date versions of all operating systems and antivirus packages. Updates frequently contain patches against newly discovered security threats, so are very important. Windows and ESET make it easy by letting you know with pop ups or other messages that updates need to be installed, so go ahead and update when recommended.

Encrypting your computer or laptop protects your data in the event of physical theft. If you frequently take your laptop out of the home/office, and you also store sensitive data, especially if it’s subject to data protection requirements, encryption is strongly advised. We use DESlock for our client’s encryption requirements and it's very straightforward to install and use.

If you still fall victim to a cyber attack, and you are presented with a demand to pay a ransom in exchange for your data, a good backup system will save the day and save you from an expensive security breach. At a minimum, back up your data daily to an external location, e.g. cloud backup service, like OneDrive.

It surprisingly easy to ‘clone’ someone’s email address, which a fraudster can use to trick you to transfer money, or to click on a dangerous link. Be very cautious of ANY email which is oddly worded, or requires urgent action from an unknown person or entity. Institutions such as your bank or online retailers will never email you asking you to change your password for example. These types of ‘social engineering’ attempts to trick you are on the rise and are getting more sophisticated. And if that Facebook or other website link tells you to ‘click to see what happens next’, don’t do it. It might be harmless, or it might send spam to all your contacts. Either way, why take the risk? Exercising awareness and staying vigilant will greatly increase your chances of protecting your computers and your money!

Like I said, it's virtually impossible to guarantee protection, but following these IT Security Best Practices will greatly increase your chances of avoiding an attack or data loss. If your organisation has more than 10 users, a more detailed plan is required, and we can always help with that, just get in touch at 091 395413 anytime!
Add a comment...

Post has attachment
Using a Public Wifi Hotspot – Is it Safe?

You’re settling down in a comfy chair in the café with your latte. You take out your phone and see ‘FREE Wifi’ in the list of network connections.
However, before you click ‘Connect’, there are a few areas to consider to ensure you don’t get a nasty surprise later…

You should always exercise caution when using a public wifi network or hotspot. If you connect to an open (i.e. you can connect without entering a password) network, be aware that the connection is not encrypted, so others in the same network might be able to watch your activities or capture sensitive data. Not only this, but hackers sometimes create a decoy network which looks legitimate (it might have the same name of the café for example), but is, in reality, a ‘honeypot’, designed to trap unsuspecting users and to steal their data. For this reason, you should never log into banking websites or make financial transactions on unsecured networks. Also, ensure you select ‘Public Network’ when prompted by Windows or your antivirus software to select the network type, to hide your activity from others.

Good antivirus software will have a personal firewall enabled, so invest the modest amount to ensure your antivirus has these and is regularly updated. Additionally, ensure your Operating System, e.g. Windows 10, is up to date. Even if you have a good antivirus package, and your Windows is up to date, the most secure way to browse the internet might be to avoid the public hotspot entirely and connect using your mobile phone’s data service, e.g. 3G or 4G. Your phone can also act as a personal wireless hotspot accessed only by you, which you can use to connect your laptop. Carrier charges apply, so make sure your browsing doesn’t use up a lot of data, as would streaming video.

If you have concerns about how to maximise cybersecurity on your mobile devices, get in touch with one of our knowledgeable experts today at 091 395413, or
Add a comment...
Wait while more posts are being loaded