NEWS

OUR LATEST NEWS AND ADVICE

Have your emails been compromised?

And that’s why it’s so popular with hackers. A large majority of cyber-attacks start in your email. Here are some ways to protect your business from your own inbox.

The data security equivalent of leaving your windows open

Yet some business owners and managers don’t have the same attitude towards their business’s data security. Which is crazy. Because there are a lot more people trying to access your business’s data, than hoping to steal your TV. Here are four key ways to improve your...

May’s Tech newsletter – Is working from home working?

Hello and welcome to the latest May edition of our monthly Technology Insider newsletter. We’re looking at working from home again this month. Because it looks likely that it’s going to stay as a big thing once the pandemic is over. There are 5 things we recommend you...

Crisis: Your office is on fire

There’s a small fire in your office. No-one is hurt and everyone is safe. But the damage to your workplace is unbelievable.  The flames. The heat. The smoke. And of course, the huge amounts of water used to put out the fire. Here’s a good question – if there had been...

Security Awareness Training

Engaging training programs that in still a security-focused culture wherein employees actively participate and make fundamental changes to the security process. Cyberattacks are getting more sophisticated by the minute. With human errors inevitable and data breaches...

Positive feedback

No doubt we will speak about this stuff soon and I am delighted we are carrying on our relationship with you on a personal, basis.  However, I would like to take this opportunity to thank you both, and also your staff, both past and present, in the help you have given...

Does your business need an upgrade?

Typically, these were the ones that had already got a robust IT infrastructure in place for their people to work anywhere, at any time, on any device. Productivity and profits can and should be improved when your business prioritises its technology.

Could I crack your staff’s passwords?

But those tend to be the ones that some staff hate the most. Because they’re difficult to type in if you don’t use a password manager. The thing is – a weak password leaves your business wide open to hackers. They can crack short obvious passwords using brute force,...

Is it worth fixing?

However. Sometimes, when it comes to business devices, it’s actually better to replace rather than repair. The real trick is knowing which is the best option for you. Now and again, what can seem like a device on its last legs can be resolved with a little care and...

March Technology Insider Newsletter

Hello and welcome to the latest edition of our monthly Technology Insider newsletter. And I’ll start with an apology, for introducing a bit of jargon to you. Smishing is the text message version of phishing. What’s phishing again? It’s where criminals send you an...

Which of these phishing scams have you heard of?

It’s where criminals send you an email, pretending to be someone else (like your bank), to try to get sensitive information from you.  But what about vishing? And smishing? And whaling? These are all forms of phishing designed to steal your information, and ultimately...

Repair or replace?

It’s always tempting to hold back on purchasing new IT equipment. Yet it can sometimes cost you more if you hang onto equipment for too long. Did you know that if a device is more than 3 years old it’s actually cheaper to buy a new one? A 5 year old PC could cost...

Our News Articles

IT support Security Reviews Office 365 How To Microsoft Refurbisher