Blog

Keep up to date with the latest insights and news

How-to guide

Mobile Device Enrolment – iPhone

Reading Time: 6 minutes This useful guide will take you through the steps of enrolling your iPhone with Microsoft’s Mobile Device Management so you really can keep your personal and work data separate.

Read More »
How-to guide

Mobile Device Enrolment – Android

Reading Time: 6 minutes It’s quite normal to want to have access to email & your calendar on the move but what security considerations need to be taken into account to keep your personal data and company data separate?

Read More »
How-to guide

Microsoft 365 MFA Setup Guide

Reading Time: 5 minutes Multi Factor Authentication (MFA) provides an additional level of security to your systems and helps combat cyber attacks. When you login to a service such as Remote Desktop Server or Microsoft 365 not only do you enter your username and password but also via the MFA app prompt you confirm it’s you

Read More »
roman soldier
Security

Protect your business with Cyber Essentials.

Reading Time: 5 minutes Today in the digital age, we store information electronically. Why? Because information is power; it can be our competitive advantage over other businesses. Our supplier list of who provides us with what, and when; it might be customer information, entrusted to us through a sales transaction and numerous other details, all particular to our business.

Read More »
patch the dog
Security

What is Patch Management?

Reading Time: 4 minutes Whatever your favourite canine might tell you, “Get off the sofa, stop chasing cars, begging for food, digging up the garden, or chewing the furniture”, whether your dog is called Patch or not, you’d be right in thinking, patch management is none of the above.

Read More »
Too Many Emails
How-to guide

Mailbox Management

Reading Time: 5 minutes Email has given us a powerful medium to communicate across continents, or just to the other side of the room.  With it comes a high volume of messages, many of which are “cakes in the kitchen” style and others that contain large attachments.

Read More »
Security

What is a Bad Actor in Cyber Security?

Reading Time: 4 minutes Michael Caine, Cameron Diaz, Will Smith, Barbara Streisand, Patrick Swayze, (that’s not fair), Halle Berry and even Robert de Niro have won one. ‘The Golden

Read More »
mobile devices
Security

What is mobile device management (MDM)

Reading Time: 4 minutes Mobile Device Management (MDM) is a system that allows businesses to securely manage the devices that their employees use to access company data and resources

Read More »