Three Thank Yous
Reading Time: 4 minutesOne constant over the last few decades is that we at CNC have prioritised customer service and high-quality work, so it has always been a source of immense pride and satisfaction when a customer has been complimentary towards us.
Windows 11 – What You Need to Know Before the Upgrade
Reading Time: 3 minutesEnd of Support for Windows 10: Windows 10 will reach its end of life in October 2025. This means that after this date, Microsoft will no longer provide security updates or support for Windows 10, making it crucial for businesses to upgrade to Windows 11 to maintain security and functionality.
Protect Your Privacy: Steps to Encrypt Emails in Outlook
Reading Time: 2 minutesThere are all sorts of encryption protocols out in the marketplace that will help you secure your emails so that your company or personal information doesn’t end up in the hands of a cyber hacker.
Why Digital Debt Causes Stress and How to Fight It
Reading Time: 2 minutesWorking with technology can be really stressful. Digital debt is a term that describes the overwhelming burden of managing the constant influx of digital communications and tasks in the work environment.
How Copilot Can Boost Your Company’s Cyber Security Efforts
Reading Time: 6 minutesThe following 5 questions were sent to me, so, I met up with Nick Hayes, Offensive Security Director at Cyber Security Associates to get his take on just how Copilot can help a company with its cyber security posture. Nick, is a seasoned Technical Leader in the Cyber Security industry, he specialises in driving strategic growth and innovation within organisations.
Copilot – A Stitch in Time Saves Nine
Reading Time: 2 minutesFor small and medium-sized businesses (SMBs), Copilot can be a game-changer, offering a suite of benefits that can help your business, bring energy to your team’s output and put a smile on your client’s face, with the improved business interaction they have with you.
Worthing Golf Club Goes the Extra Mile
Reading Time: 2 minutesGolf courses are often located in rural areas, so they face unique challenges when it comes to reliable internet connectivity. These locations are ideal for golf and are a key aspect of the golfing experience.
Protecting your Emails with DKIM/DMARC
Reading Time: 3 minutesSending an email is a bit like a relay race. Each runner has a crucial role to play, in ensuring that the baton (the email) reaches the finish line (the recipient) without any tampering.
How to Prepare Your Team for DORA Changes in 2024
Reading Time: 5 minutesThe financial sector is uniquely exposed to cyber risk because of the large amounts of data and high-risk transactions that are handled.
The Fédération Internationale de l’Automobile (FIA) gets…..HACKED
Reading Time: 2 minutesIn the 200 mph world of Formula 1, speed and precision are paramount. But, it wasn’t a race car that brought the Fédération Internationale de l’Automobile (FIA) to its knees—it was a cleverly crafted email
Meet James Butler, our top TAM
Reading Time: 3 minutesWhat is your earliest recollection of IT in your life? I was about 13 years old, and I remember arguing with my dad about whether I could stay up all night to play computer games on a PC that he had brought home.
CNC-FluidOne FareShare Charity run update
Reading Time: 2 minutesTeam CNC-FluidOne put on their running shoes and 15 runners did their bit on a wonderful summer’s evening. Burning up 5 kilometres, all in an effort to support FareShare UK.
What you need to know to keep your data safe
Reading Time: 2 minutesThere’s a common myth going around that Microsoft 365 automatically protects and backs up your data. Sadly, it’s a popular misconception that many businesses put themselves at risk with
Microsoft Copilot: The future of workplace efficiency revealed
Reading Time: 6 minutesFor business leaders aiming to unlock operational performance while maintaining a competitive edge, finding a technology that speeds up decision-making, boosts productivity, and fosters profitability is increasingly challenging.
Adding Multiple 365 MFA Methods
Reading Time: 2 minutesThis guide is intended to show you how to setup multiple multifactor authentications which is often a requirement for Self Service password reset.
365 Self Service Password Reset
Reading Time: 2 minutesIn this guide, it will cover how to view the 365 Phishing reports as well how to check who has completed training if they have been caught out by a Phishing simulation.
From novice to expert: Anna Barrett’s transformational apprenticeship experience
Reading Time: 3 minutesAn apprenticeship is a great way of training for a career in IT. Typically, it’s 18 months of intense training and lots of study.
Unlocking your company’s IT potential: the power of a dedicated technical account manager
Reading Time: 3 minutesIT outsourcing is a powerful and effective way to access specialised skills, reduce costs, and increase the efficiency of your IT network.
MobileFlex: a game-changer in business mobile communication for today and beyond
Reading Time: 2 minutesNow CNC is part of the FluidOne Group of Companies, we have a lot of extra services to offer our customers, including mobile connectivity.
The recent cybercrime wave: why are NHS, Ticketmaster & Santander vulnerable?
Reading Time: 7 minutesJune was a black month with some of the worst cyber hacks perpetrated in 2024 so far. Ticketmaster, the NHS and Santander were all in the national press, with news of them being hacked by cyber terrorists.
Empowering businesses with Litigation Hold and eDiscovery in Microsoft 365 Business Premium
Reading Time: 4 minutesIn the fast-paced world of business, data plays a pivotal role in decision-making, collaboration, and overall success. However, with great data comes great responsibility, especially when it comes to legal matters.
How to use your smartphone in the art of disconnecting
Reading Time: 3 minutesSwitching off from work can be hard. There’s an expectation to be “always on”, where your personal life and your business world never separate. Here’s how to get a minute or two to practice the art of stone stacking.
If there’s something strange in your IT network, who ya gonna call?
Reading Time: 3 minutesThis time 40 years ago in June 1984, Ghostbusters was the number one film.
Our new service desk teams: how this will work for you.
Reading Time: 2 minutesOur service desk has undergone in recent months some changes. As part of CNC’s continuous improvement programme, we have revised how our helpdesk structure resolves your IT problems.
Stay safe and secure: cyber tips for when you’re on the move
Reading Time: 5 minutesSo, you’ve been going through your checklist before you fly off on your business trip: encrypt or delete sensitive files? CHECK. Tamper seals over the hard drive access points? CHECK. Spare USB port locks? CHECK, privacy screen? CHECK. Was it always like this?
Using 7zip when Windows fails you
Reading Time: 3 minutesIn this quick guide we’ll show you how to unzip and create ZIP files using 7zip.
Remembering passwords can be a real headache.
Reading Time: 3 minutesI can remember how much it cost to see Star Wars, my first car’s registration plate or who was number 1 in the charts, 30 years ago, but a password from yesterday?
Starlink success: A game-changer in internet access
Reading Time: 2 minutesA glowing review from a customer about a supplied product beats any marketing material. Starlink proves to be a major success for forward-facing surveyors. Here is how:
An evolution of cyber crime: The rise of cyber scam factories
Reading Time: 3 minutesThere are many sides to cyber crime. However, there is another aspect of the horror of cyber crime that is the cyber scam factory.
Pen Testing – let me explain
Reading Time: 5 minutesIn the IT industry, we have a penchant for acronyms. If we can condense the name of a service, product, or piece of equipment into just three letters, we’re as happy as a lark.
It couldn’t have happened to a nicer bunch of cybercriminals
Reading Time: 3 minutesThe world’s largest criminal ransomware gang (Lockbit) have not only been infiltrated by the UK’s National Crime Agency (NCA) but they have had their data stolen.
Using Microsoft’s roadmap for your business
Reading Time: 2 minutesRunning a business and keeping abreast of all the technological things that are sent your way can be pretty daunting. See what’s on the horizon with Microsoft Roadmap.
FluidOne goes the extra mile for FareShare in 5K charity event
Reading Time: 2 minutesFluidOne takes FareShare cause to heart, with a 5K run organised for this July, to help raise funds for this great charity.
365 Backups: your insurance policy against data loss and disasters
Reading Time: 5 minutesJoke for you: Why don’t clouds use Microsoft services? Because even in the sky, they can’t find a backup!
SonicWall SSLVPN – Enhanced (SMA)
Reading Time: 4 minutesA VPN allows you to access resources on your office network from wherever you are. SonicWall NetExtender is a piece of software that can be installed on your laptop or desktop that initiates the VPN connection.
Southern Water: faces reputational fallout with confirmed cyber hack
Reading Time: 3 minutesSouthern Water now admits that as many as half a million customers’ personal information may have been stolen in the recent cyber attack.
What you need to know about the PSTN switch-off
Reading Time: 2 minutesEvery technology has its day and now, it’s time to take the next step forward in the evolution of telecommunications.
All you need to know about an IT Risk Register
Reading Time: 2 minutesOver the next few months, we’ll be putting together a Risk Register for each of our customers and placing it on the Portal for you.
Business showdown: cloud service vs. on-premise solutions
Reading Time: 5 minutesIn the late autumn of 1965, the Rolling Stones released ‘Get off my cloud’. It’s one of the band’s signature tunes, reaching the number-one spot in the UK, the US, Canada and Germany. They could have never imagined that the title of their song would have such relevance today.
Staying one step ahead: phishing, vishing, and smishing
Reading Time: 4 minutesPhishing, vishing, and smishing sound like the names of small villages on a beautiful coastline in some faraway paradise, but I can assure you these names stand for something completely onerous.
What you need to know about Windows end of life support in 2025
Reading Time: 2 minutesAs part of Microsoft’s Modern Lifecycle Policy, the Company is ending all active support for Windows 10 on October 14th, 2025.
High-speed Internet, available almost anywhere on Earth
Reading Time: 2 minutes‘Connectivity where you least expect it’. That’s a bold statement to make, but can the world’s most advanced internet system, do exactly what it says it can do?
UK water company confirms cyber attack
Reading Time: 3 minutesSouthern Water confirms network breach, as cybercriminals Black Basta attempt to hold the UK utility to ransom as they threaten to release data.
The ultimate guide to protecting your company from cyber threats
Reading Time: 3 minutesYou go into your office and find yourself locked out of your computer and, it gets worse you’re being asked for a ransom to retrieve your access, here’s how you can stop that.
CNC integrates with FluidOne, aligning with a group of premium brands
Reading Time: 3 minutesCNC provides the very best in IT services, expertly delivered across the Southeast. But now, customers will also benefit from a wider product portfolio supported by FluidOne, a nationwide, market-leading provider of Connected Cloud solutions.
Protecting your data: Lush’s response to its recent cyber attack
Reading Time: 2 minutesLush the cosmetics store, home to some of the most beautiful fragrances in the high street, has announced on its website, that it had been the victim of a cyber security incident.
Outsourced IT Support: Finding the Perfect Fit for Your Company
Reading Time: 4 minutesOutsourced IT support is just like a marriage. It’s about finding an IT partner who is going to go through all the joys and wonders of business life, with your hand in hand.
Preparing for Cyber Essentials
Reading Time: 4 minutesThis guide is intended to set out the process of preparation and gaining the Cyber Essentials and/or Essentials Plus certification.
SonicWall SSLVPN – Standard
Reading Time: 5 minutesA VPN allows you to access resources on your office network from wherever you are. SonicWall NetExtender is a piece of software that can be installed on your laptop or desktop that initiates the VPN connection.
40 Governments around the world crack down on paying out to ransomware gangs
Reading Time: 4 minutesRansomware attacks are the number one tool used by cyber criminals to steal money and data, which creates havoc upon the social apparatus of society.
Microsoft 365 Copilot – A Vision of Things to Come
Reading Time: 4 minutesWe spend an average of about 37 hours a week at work, of which 68% is spent on ‘doing stuff,’ spending time on various tasks, creating more tasks and attending meetings. Don’t we just love those meetings?
Common Mistakes to Avoid in Backup and Disaster Recovery
Reading Time: 4 minutesIn today’s data-driven world, backup and disaster recovery have become crucial aspects of any business’s IT infrastructure.
10th October 2023 (Windows 2012)
Reading Time: 5 minutesYou would be absolutely right in thinking that the date 10th October, is only 10 weeks away from Christmas. However, the 10th of October 2023, is a very special day in its own right. It is in fact, the last day of support and security from Microsoft for Windows Server 2012, and Windows Server 2012/R2.
Exploring the Benefits of Microsoft 365 for Businesses
Reading Time: 5 minutesIn today’s fast-paced and interconnected world, businesses are continually seeking ways to enhance productivity, streamline operations, and stay competitive.
Outsourced IT Support, Is it really worth it?
Reading Time: 6 minutesIn today’s rapidly evolving business landscape, you’d be hard-pressed to find a business or sector that doesn’t rely on IT in one form or another.
The Crucial Role of a Chief Information Security Officer (CISO)
Reading Time: 5 minutesIn today’s digital landscape, businesses face an ever-increasing threat of cyber-attacks and cybercrime. As organisations become more reliant on technology and data, the need for advanced security measures to protect against cyber threats has become paramount.
The Essential Components of a Reliable Backup and Disaster Recovery Strategy
Reading Time: 4 minutesBusinesses today heavily rely on their data and IT infrastructure to operate smoothly and efficiently.
Lend Me Your Ear
Reading Time: 4 minutesThe vast array of headset models can make choosing a suitable one somewhat daunting. In this short article I aim to help you identify a headset suitable for your needs.
The Benefits of Outsourced IT Support for Small and Medium-Sized Businesses
Reading Time: 4 minutesIn today’s digital age, technology plays a crucial role in the success of small and medium-sized businesses (SMBs). However, managing and maintaining an efficient and secure IT infrastructure can be a daunting task for many SMBs.
Reviewing 365 Phishing Reports
Reading Time: 4 minutesIn this guide, it will cover how to view the 365 Phishing reports as well how to check who has completed training if they have been caught out by a Phishing simulation.
Mailbox Housekeeping
Reading Time: 5 minutesIn an age where so much communication is electronic it’s easy to forget that your mailbox does have a finite size. Like a filing cabinet there is only so much you can store in it before it becomes full and you have to fillet out old documents to make way for newer ones.
MOVEit File CyberHack
Reading Time: 4 minutesCybercriminals known as Cl0p ransomware group, thought to be part of a Russian crime ring, have exploited a newly discovered flaw within the popular MOVEit file transfer software.
Microsoft 365 Email Encryption
Reading Time: 3 minutesAlthough many people don’t realise it, an email is not a secure communication medium by default. Think of it like writing on a postcard and then posting it. Along it’s journey to the recipient anyone can read the contents.
Protecting Your Business from Cybersecurity Threats: Top Tips for Enhanced Security
Reading Time: 4 minutesCybersecurity is not just about technology; it’s about people, processes, and awareness.” – Vishal Salvi In today’s digitally-driven world, businesses face an ever-growing threat landscape when it comes to cybersecurity. Cybercriminals are continuously devising new techniques to exploit vulnerabilities and compromise sensitive data. As a result, safeguarding your business from cyber threats has become more… Continue reading Protecting Your Business from Cybersecurity Threats: Top Tips for Enhanced Security
Antivirus vs EDR what’s the difference?
Reading Time: 5 minutesWhen the picture above was taken sometime in the early 80’s, Anti-Virus (AV) protection was almost unheard of. The idea that someone would create a malicious program that would cause your computer to fail was in its infancy.
How to setup a Microsoft 365 App Password
Reading Time: 4 minutesSome applications do not support Multi-factor authentication which can become a problem when Security defaults or Conditional Access have been enabled on a Microsoft 365 tenant. To overcome this we can create App Passwords that can be used to connect to Microsoft 365 Services for a specific application.
Mobile Device Enrolment – iPhone
Reading Time: 6 minutesThis useful guide will take you through the steps of enrolling your iPhone with Microsoft’s Mobile Device Management so you really can keep your personal and work data separate.
Mobile Device Enrolment – Android
Reading Time: 6 minutesIt’s quite normal to want to have access to email & your calendar on the move but what security considerations need to be taken into account to keep your personal data and company data separate?
Microsoft 365 MFA Setup Guide
Reading Time: 5 minutesMulti Factor Authentication (MFA) provides an additional level of security to your systems and helps combat cyber attacks. When you login to a service such as Remote Desktop Server or Microsoft 365 not only do you enter your username and password but also via the MFA app prompt you confirm it’s you
Protect your business with Cyber Essentials.
Reading Time: 5 minutesToday in the digital age, we store information electronically. Why? Because information is power; it can be our competitive advantage over other businesses. Our supplier list of who provides us with what, and when; it might be customer information, entrusted to us through a sales transaction and numerous other details, all particular to our business.
What is Patch Management?
Reading Time: 4 minutesWhatever your favourite canine might tell you, “Get off the sofa, stop chasing cars, begging for food, digging up the garden, or chewing the furniture”, whether your dog is called Patch or not, you’d be right in thinking, patch management is none of the above.
Mailbox Management
Reading Time: 5 minutesEmail has given us a powerful medium to communicate across continents, or just to the other side of the room. With it comes a high volume of messages, many of which are “cakes in the kitchen” style and others that contain large attachments.