Join us this April 2025 at the heart of Gloucester City Centre for the Glos-FHub Pop-Up! We’re setting up a vibrant, temporary hub at East Gate Street Shopping Centre to bring together our Armed Forces communities. This is your chance to connect, share, and celebrate with fellow veterans and supporters. Whether you’re looking to network,...
What is Malware?
Malware is a term that stands for malicious software. It refers to any software that is designed to harm, disrupt, or access a computer, server, client, or network without the user’s consent or knowledge. Malware can steal data, damage devices, encrypt files, display unwanted ads, spy on users, or perform other malicious actions. Malware can be...
Password Best Practices
Passwords are the key to almost everything you do online, and you probably have multiple passwords that you use throughout the day. Choosing hard-to-hack passwords and managing them securely can sometimes seem inconvenient. Fortunately, there are simple ways to make your passwords as secure as possible. Doing so can keep hackers from taking over your...
Data Detox
NUKE YOUR APPS! Take a guess–how many apps do you have on your phone or tablet? Now, actually count them. Ask yourself, do I NEED all these apps? Can any be deleted? Try deleting a few you NEVER use or haven’t used in a long time. This will free up some space and and resources on...
What is Vishing & Smishing?
What is Vishing? Vishing is a form of attack that attempts to trick victims into giving up sensitive personal information over the phone. While that makes it sound like an old-fashioned scam, vishing attacks have high-tech elements: they involve automated voice simulation technology, for instance, or the scammer may use personal information about the victim harvested...
What is Social Engineering?
Most social engineering attacks rely on actual communication between attackers and victims. The attacker tends to motivate the user into compromising themselves, rather than using brute force methods to breach your data. The attack cycle gives these criminals a reliable process for deceiving you. Steps for the social engineering attack cycle are usually as follows: This process...
What is Phishing!
Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. The information is then used to access important accounts and can result in identity theft...
