Call us on 03450 21 21 51

SRM Solutions
The SRM Blog

Internet security

Filter by category
Filter by topic
Promoting and Protecting your Identity on social media

Promoting and Protecting your Identity on social media

How much control is too much when it comes to social media? Organisations spend millions on their marketing campaigns in the hope and expectation of raising brand awareness and..

The Dark Web

The Dark Web

Search Engines like Google and Safari only have access to about 4% of the information on the web. The other 96% is what is referred to as the Deep..

Cyber Security health tips for the New Year

Cyber Security health tips for the New Year

As New Year resolutions go, enhancing personal cyber security may not be as high on people’s lists as that resolution to take out a new gym membership or embark..

How to protect your data in free public WiFi hotspots

How to protect your data in free public WiFi hotspots

In an ‘ethical experiment’ conducted earlier this year, a primary school child hacked into a free public WiFi hub in just over ten minutes. The young hacker, a seven-year-old..

Why is agility a critical part of e-safety?

Why is agility a critical part of e-safety?

Last month dozens of images of British children were discovered on a Russian website used by paedophiles. Until they were tipped off, the parents of the children involved had..