Get free advice on all things IT


June 18, 2018

Silverbug Unveiled As Junior Shirt Sponsor for Wolves FC

The Silverbug brand continues to show rapid growth after agreeing to become the junior shirt..

May 25, 2018

Beware of the EternalBlue Exploit: The Importance of Firmware Updates

Keeping your system up to date is key to protecting your business. Cyber criminals are more..

May 16, 2018

The Aftermath of the WannaCry Exploit - Or Is It?

Ransomware has been a major threat to businesses since the mid 2000s. Cyber criminals have..

May 7, 2018

How Effective are Data Recovery Services? How Much Can Be Recovered?

We've all experienced data loss before, whether it was because of data corruption, malware, hard..

May 1, 2018

CryptoLocker Virus: the Foundation of Modern Malware & How to Decrypt It

Modern day Ransomware has significantly evolved since it originated in 1989 with the AIDS..

April 25, 2018

The Untold Benefits of Cloud-Based Disaster Recovery (That You Really Should Know)

It's no secret that disasters with your data can be undeniably harmful to your business...

April 17, 2018

Looking at the Engine: How Does Ransomware Work?

Ransomware has been on a rampage, infecting computers all over the world and encrypting large..

April 12, 2018

How did WannaCry Infect the Likes of the NHS?

Ransomware attacks can play absolute havoc with your business. If you're unprepared,that is...

April 3, 2018

The Importance of a Disaster Recovery Plan in the 21st Century

When it comes to Disaster Recovery, it definitely pays to be proactive. Disasters can strike in..

March 28, 2018

Front vs Back-Door Viruses: Which Should I Be Locking First?

Opening up your computer and finding that you've somehow been infected with a virus is never a..

March 23, 2018

We’ve Been Accredited With the ISO 27001 Certification

Silverbug have recently been accredited with the ISO 27001 certification - a standard which..

March 19, 2018

Having a CrySis? Remote Desktop Protocols Might be the Problem

Here's what remote desktop protocols are, why ransomware can easily infiltrate them and what you..

FREE Case Consultation

Recent Posts