Profile cover photo
Profile photo
Jordan IT Services
About
Posts

Post has attachment
MICROSOFT EDGE to receive independent updates from WINDOWS 10 #WINDOWS10 #MICROSOFT #EDGE

MICROSOFT EDGE to receive independent updates from WINDOWS 10 Online report indicates that Microsoft Edge will begin to receive feature updates through the Windows Store this autumn in a move to save the browser from shrinking share prices. On Monday,…
Add a comment...

Post has attachment
Our Sci-Fi Future, Silly vs Terrifying #Sci-Fi #Silly #Terrifying

Our Sci-Fi Future, Silly vs Terrifying The future is upon us!  Modern technological developments are now strikingly similar to the science fiction of the past.  While we aren’t living in domed cities with flying cars, we’ve got buildings that reach for…
Add a comment...

Post has attachment
The way you hold your smartphone can “give a way” passwords and PINs to hackers #smartphone #passwords #PINs #hackers

By analysing the movement of a device as the keyboard was used, Cyber Experts at Newcastle University say they were able to reveal just how easy it is for malicious websites and apps to spy on users using the motion sensors in smartphones and tablets. The…
Add a comment...

Post has attachment
What’s is a VPN & Top VPNs 2017 #VPN, #VirtualPrivateNetwork

What’s a VPNs & Top VPNs 2017 What is a VPN? If you’re concerned about online privacy and want to spies away, a virtual private network (VPN) is what you require.. We round up the best VPN services for you to protect your location and allowing you to…
Add a comment...

Post has attachment
An Introduction to Cloud Computing, Cloud Computing Explained. #CloudComputing #Cloud

The term Cloud computing is the delivery of hosted services and applications over the internet. Cloud computing enables people and businesses to use a computer resource, such as storage or an application, without having to build and maintain computing…
Add a comment...

Post has attachment
Fifth Generation – 5G is on its way…. Most phones on the market are running 3G and 4G. The 5G wireless network is expected to roll out in early 2020, and an increasing number of businesses are already investing to prepare for the new mobile wireless…
Add a comment...

Post has attachment
Security and Choice of Password #Security #Passwords #cybersecurity

Choose your passwords carefully… According to recent report by Verizon which you can read here , the biggest issue regarding data security is your choice of password and the steps you take to protect it.  With “63% of confirmed data breaches involved…
Add a comment...

Post has attachment
Secure Digital SD ABC #SDcards

SD Cards Universally used across a spectrum of digital hardware buying the right SD card can be confusing. The three main considerations when purchasing are: A) Which Size? Well you will of course need to check your device but basically there are three…
Add a comment...

Post has attachment
Understanding Phishing and the need for Cyber Essentials #Phishing #CyberSecurity

Phishing Understanding Phishing and the need for Cyber Essentials Russian high-tech crime investigating company Group-IB have recently reported that cyber criminals have stolen £18.7 million from banks in Russia between August 2015 and February 2016 using…
Add a comment...

Post has attachment
Artificial Intelligence, should we be worried about AI? #ArtificialIntelligence #AI

Artificial Intelligence Should we be worried? It was only a couple of years ago when the majority of industry professionals believed that we were still decades away from seeing a computer win at a high level playing the ancient Chinese game GO, but for…
Add a comment...
Wait while more posts are being loaded