Blog
Keep up to date with the latest insights and news
Lend Me Your Ear
Reading Time: 4 minutes The vast array of headset models can make choosing a suitable one somewhat daunting. In this short article I aim to help you identify a headset suitable for your needs.
The Benefits of Outsourced IT Support for Small and Medium-Sized Businesses
Reading Time: 4 minutes In today’s digital age, technology plays a crucial role in the success of small and medium-sized businesses (SMBs). However, managing and maintaining an efficient and secure IT infrastructure can be a daunting task for many SMBs.
Reviewing 365 Phishing Reports
Reading Time: 4 minutes In this guide, it will cover how to view the 365 Phishing reports as well how to check who has completed training if they have been caught out by a Phishing simulation.
Mailbox Housekeeping
Reading Time: 5 minutes In an age where so much communication is electronic it’s easy to forget that your mailbox does have a finite size. Like a filing cabinet there is only so much you can store in it before it becomes full and you have to fillet out old documents to make way for newer ones.
MOVEit File CyberHack
Reading Time: 4 minutes Cybercriminals known as Cl0p ransomware group, thought to be part of a Russian crime ring, have exploited a newly discovered flaw within the popular MOVEit file transfer software.
Microsoft 365 Email Encryption
Reading Time: 3 minutes Although many people don’t realise it, an email is not a secure communication medium by default. Think of it like writing on a postcard and then posting it. Along it’s journey to the recipient anyone can read the contents.
Protecting Your Business from Cybersecurity Threats: Top Tips for Enhanced Security
Reading Time: 4 minutes Cybersecurity is not just about technology; it’s about people, processes, and awareness.” – Vishal Salvi In today’s digitally-driven world, businesses face an ever-growing threat landscape
Antivirus vs EDR what’s the difference?
Reading Time: 5 minutes When the picture above was taken sometime in the early 80’s, Anti-Virus (AV) protection was almost unheard of. The idea that someone would create a malicious program that would cause your computer to fail was in its infancy.
How to setup a Microsoft 365 App Password
Reading Time: 4 minutes Some applications do not support Multi-factor authentication which can become a problem when Security defaults or Conditional Access have been enabled on a Microsoft 365 tenant. To overcome this we can create App Passwords that can be used to connect to Microsoft 365 Services for a specific application.