The Macnamara Blog

Macnamara blog

You have a new Fax!

When was the last time you received a fax? Possibly never. But, it might surprise some of you to know that millions of faxes get sent every day. In Germany, Japan and the US especially, they are alive and well, if not so much here in the UK. But how are they used in Phishing?

Read More »
Macnamara blog

Information Security

You can’t have IT without Security!

There, we said it, but what does that mean and perhaps more importantly, what does it mean for our customers?

Read More »
Macnamara blog

Is The MSP (Managed Services Provider) Model Broken?

The evolution of the MSP started in the 1990s with the emergence of application service providers (ASPs) who helped pave the way for remote support for IT infrastructure. From the initial focus of remote monitoring and management of servers and networks, the scope of an MSP’s services expanded to include mobile device management, managed security, remote firewall administration and security-as-a-service, and managed print services.

Read More »
Macnamara blog

Credit Card Fraud: Missed Delivery

Continuing our expose on Phishing, let’s take a look at this real example of a common scam where you’re asked to enter bank card details to re-schedule a missed delivery.

Read More »
Best practices

Phishing – How Does It Work?

Everyone gets phishing emails. Unfortunately they’re everywhere. Most get filtered through to your junk folder or caught before they are even delivered, but some still get through. But what they are and how they work isn’t always clear. Here we’ll try to de-mystify an all too common and potentially dangerous nuisance.

Read More »
Best practices

Why you need a secure password

A strong password is essential for preventing others from gaining unauthorised access to your account or device. The stronger the password the more difficult it will be for a hacker to crack.

Read More »
Best practices

How to make a secure password

It can be hard to think of a password that you can remember when you need it, let alone multiple passwords and variations. What can make this is easier is using a methodology or naming convention for your passwords.

Read More »
Scroll to Top