What to do after a data breach?

Image of a spider web on a dark surface

What is the Dark Web? You are currently browsing the opposite of the Dark Web – the Surface Web. That means that our site is indexed and searchable by Search Engines.  However, the Deep Web is hidden, so there is no way you can get to it without actually attempting to. The Deep Web is … Read more

IP-addresses simply explained

Stack of letters

You may have already heard about IP-addresses and maybe even the different versions of IP-addresses. We have currently been using IPv4 (the acronym stands for Internet Protocol version 4), but since all the addresses are running out quickly, we will be switching over to IPv6 in the future. Let’s look a little deeper into what … Read more

Most popular RAID levels explained

Image of a hard drive platter

RAID is an abbreviation from Redundant Array of Independent Disks. Having independent disks is the main idea behind RAID since it improves the fault tolerance and the chances that if something goes wrong, you will not lose your important data. Fun fact: it was called Redundant Array of Inexpensive Disks at first, but since the … Read more

Difference between Malware and Viruses

Image of a bug

When most people think of an infected computer, their brain screams, “VIRUS!”. That is usually not the case, and most infected computers that we receive don’t have a virus. Instead, most affected computers have malware. What’s the difference between Malware and Viruses? Viruses are programs that replicate themselves and try to spread through your computer … Read more