Solutions4IT Logo
Money Back Guarantee
6 Month Trial Period
Plain English IT Support
No jargon, no tricky words
Trustworthy & Reliable
4.9* Google Reviews
Happy clients
99% Customer Satisfaction

SOLUTIONS IT NEWS

Industry insights and company news from the world of IT
Passwordless Authentication- Death of Passwords?

Passwordless Authentication- Death of Passwords?

Passwordless authentication lets users log in to apps or systems without entering a password. Instead, you use something else to prove you are who you say you are. That might be a…
What is Cybersquatting

What is Cybersquatting

Domain squatting — also called cybersquatting — is when someone registers a domain name to profit from your brand. They aim to make money, traffic, or trick your customers. Usually,…
Edge Keeps Unencrypted Passwords In Its Memory

Edge Keeps Unencrypted Passwords In Its Memory

Microsoft Edge has come under fire after a security researcher revealed that the browser loads all saved passwords into memory in cleartext as soon as it starts up. This means…
More Phishing Campaigns Are Exploiting Amazon SES

More Phishing Campaigns Are Exploiting Amazon SES

Amazon Simple Email Service (SES) is a light-weight, cost-effective email service that enables users to send and receive emails from their own domains. However, Phishing attackers have begun leveraging this…
UK Enforces Social Media Restrictions for Under-16s

UK Enforces Social Media Restrictions for Under-16s

The UK government is edging closer to introducing social media restrictions for under-16s, with plans currently under consultation. While nothing is fully locked in yet, one thing is clear —…
Cyber Security flaw in Hikvision Cameras

Cyber Security flaw in Hikvision Cameras

Cyber crime has risen considerably across recent years. It’s safe to say, though, that Cyber Security has also advanced, from online countermeasures to physical security. However, sometimes, the devices that…
Microsoft Teams Vishing Campaign

Microsoft Teams Vishing Campaign

Back in November, a customer reached out for help; what the Microsoft Detection and Response Team (DART) uncovered was an example of how phishing, or more specifically vishing, can still…
Methods of Bypassing MFA

Methods of Bypassing MFA

We’ve all heard of things like Malware, perhaps even more specific terms like Spyware, but in this blog, we’ll cover two methods of bypassing MFA that you may not be…
Request your FREE IT Audit button
© Copyright Solutions 4 IT Ltd 2026. All Rights Reserved. Terms & Conditions Privacy Policy