Coronavirus Precautions

Coronavirus Precautions

To our valued customers,

Our thoughts are with all who have been impacted by the coronavirus outbreak.

As part of our enduring commitment to the health and safety of our employees, customers and surrounding communities, we have temporarily closed the stores.

But have our virtual store up and running and are able to be contacted on 0161 962 9595 and we will do whatever we can to assist you. Or you can email sales@fathomit.co.uk.

We will continue to monitor the situation and will be reviewing the decision of when to re-open when the health and wellbeing of our employees and customers can be protected.

The impact of the coronavirus outbreak is an ever-evolving situation. Our team will continue to keep pace and closely follow guidance from the World Health Organisation and Public Health England. We will keep you informed of any new information as appropriate.

We love what we do and are grateful for our loyal customers.

Fathom IT was founded in 2001, the start of a message that rests on integrity, passion and our deep commitment to being responsible in all that we do. This legacy continues to guide how we look after you, our employees and our surrounding communities.

Please take care of yourselves and each other.

Thank you Nathan Evans CEO

Fathom Information Technology Ltd

Facebook’s latest app data bug exposed the private photos of 6.8m users

A New week and a data breach for Face book it effect up 6.8 Million user the problem give Mobile Apps access to all your photo.

The bug was live in September before being fixed, and Facebook could be in trouble with EU regulators for waiting so long to report it. If you’re one of the users that might have been affected, you should see an alert the next time you log in.

This show that any company can lose data, here in the uk any size company can be fine under the GDPR act if it dose not take care of user data. If you need help you can speak to one of our GDPR speiclets book one now .

Your Name (required)

Your Email (required)

Phone Number

Your Message

 

Rootkit

A rootkit is malicious malware designed to remotely access or control a computer without being detected by users or security software programs. Using rootkits, cybercriminals can execute files,steal information, modify configurations, alter software, or even install more malware. Rootkits can be included in software applications and can enter a computer through phishing attacks or through a security vulnerability. A rootkit is very difficult to remove, so prevention is key.

Keylogger

Keylogger malware is a dangerous threat to a PC user’s privacy. It will track your keystrokes and save them in a hidden file on your computer. After a certain amount of time, the file is sent to the hacker automatically, who will use the keystroke data to get your passwords or personal and business information. Keyloggers often enter computer systems as trojans, disguised as a free or useful app or download,and can install itself when users are clicking and browsing the Internet or downloading software.

Worms

Worms are a type of malware that uses a computer network to replicate itself and spread. They are self-replicating and unlike viruses,do not need human action to quickly spread through your computer, or even an entire network.Worms often gain entry to a computer through a security vulnerability or weakness.