Complete I.T. Blog

Legal Compliance and Your Guest Wireless Network

Legal Compliance and Your Guest Wireless Network

So, you have a guest wireless network, or have you been considering rolling out one out for the first time? You’ve done the research, and you’re confident about your hardware choices, network management strategy and planned security measures. All the boxes are ticked, and you’ve covered all your bases. Or have you?

read more
A brief History of Ransomware

A brief History of Ransomware

It may be difficult to imagine, but the first ransomware in history emerged in 1989 (that’s 27 years ago). It was called the AIDS Trojan, whose modus operandi seems crude nowadays. It spread via floppy disks and involved sending $189 to a post office box in Panama to pay the ransom.

read more