Solutions4IT Logo
Money Back Guarantee
6 Month Trial Period
Plain English IT Support
No jargon, no tricky words
Trustworthy & Reliable
4.9* Google Reviews
Happy clients
99% Customer Satisfaction

SOLUTIONS IT NEWS

Industry insights and company news from the world of IT
microsoft-teams-logo

Microsoft Teams Vishing Campaign

Back in November, a customer reached out for help; what the Microsoft Detection and Response Team (DART) uncovered was an example of how phishing, or more specifically vishing, can still…
Phishing blog cover

Calendly Phishing Attacks

Recently, a report from Push Security revealed a newly discovered phishing campaign- using Calendly to steal Google/Facebook ad logins. The meeting invite method of phishing isn’t new, but the particular…
ncsc

NCSC Warning: Cisco SD-WAN Networks Being Targeted

The NCSC have recently issued a warning about attackers targeting organisations using Cisco Catalyst SD-WAN systems. If your business relies on SD-WAN to connect offices, data centres, or remote workers,…
Data Breach and Microsoft Cyber Security Cyber Attack Cyber Threat Pegasus Spyware blog cover image

Mac Users Beware! New Malware Campaign Spotted

It’s that time again… a new malware campaign has been discovered. This time, Mac users are being targeted specifically, as the campaign impersonates a beloved Mac utility called CleanMyMac. Let’s…
image of an iPhone

A Powerful iPhone Hacking Toolkit Has Been Discovered

Cybersecurity researchers have uncovered a highly advanced iPhone hacking toolkit that may have already infected tens of thousands of devices worldwide. The toolkit, known as Coruna, allows attackers to silently…
image cover for human error blog

Reducing human error in cyber security

When we reference human error in regard to cyber security, we are talking about individuals that cause or allow a security breach to happen as a result of making an…
Cyber Essentials

Your guide to Cyber Essentials

Cyber Essentials is a scheme backed by the Government aiming to help businesses and organisations alike to be protected against a range of cyber attacks. Cyber criminals target all types…
Request your FREE IT Audit button
© Copyright Solutions 4 IT Ltd 2026. All Rights Reserved. Terms & Conditions Privacy Policy