Simple Linux backups using 7-zip (7z) and tar

In this post I want to look at the use of Linux terminal commands for a simple and effective backup routine on Linux. We all know we should backup regularly, but it always feels like a pain to perform backups. As a result, most of us have been burnt by the loss of data from […]

Cybersecurity best practices for small businesses

In an era dominated by digital advancements, small businesses increasingly rely on technology to drive growth and efficiency. However, this increased reliance on digital platforms also exposes them to cyber threats. I’ve worked in technology implementation and maintenance for 20 years now, and cybersecurity has increasingly become a critical concern for small businesses. Gone are […]

eMail hacked? 9 things to do now

Taking you through the steps to recover from a hacked eMail account, and to minimise the chance of a future hack. If your eMail is hacked, you need to do more than just change your password. This article answers the question of “what next?”for those who have suffered from an account hack.

Cyber security awareness training: Protecting yourself and your organisation

I’ve spent my career advising on, and implementing, information technology at everything from multi-national corporations to small businesses. I’m regularly confronted with the need to step up the knowledge of an organisation (not just the IT department) to protect against cyber attacks. I know it’s difficult for small businesses in-particular to find cost-effective ways to […]

When is the right time to replace your smartphone?

In today’s fast-paced technological landscape, smartphones have become an integral part of our lives. They are our communication hubs, personal assistants, entertainment centers, and more. However, with the rapid advancement of technology, it can be challenging to determine when it’s time to bid farewell to your trusty old device and welcome a new smartphone into […]

How to securely wipe a computer (when selling or disposing)

When it comes to selling or disposing of an old computer (desktop or laptop), it isn’t always easy to be sure that your data cannot be recovered by the new owner. I’ve spent my career working in the IT industry, so this is my guide on how to securely wipe a computer that is running […]

Is it safe to use cloud storage?

It used to be the case that I, like many others, would snap up any offer of free cloud storage, as digital photography and general data hoarding created a seemingly endless need for data storage. Fast-forward to today, and data breaches are something you don’t have to work in technology to recognise are a very […]

Genuine user review of Hostinger Premium Web Hosting

Having struggled to find one myself, this is a genuine review from a real Hostinger customer. As at 17th November 2019, BeachyUK.com is now on the Hostinger Premium Web Hosting package. In November 2019, I decided BeachyUK.com needed to move off free/near-free web hosting. Site performance had been slow, and free hosts kept disabling the […]

Adblocker detected

Please bear in mind that ad blockers prevent this website covering its costs.

If you find this site useful, please consider supporting me by whitelisting this site, or making a £1 / $1 donation.