40 Governments around the world crack down on paying out to ransomware gangs
Reading Time: 4 minutes Ransomware attacks are the number one tool used by cyber criminals to steal money and data, which creates havoc upon the social apparatus of society.
Microsoft 365 Copilot – A Vision of Things to Come
Reading Time: 4 minutes We spend an average of about 37 hours a week at work, of which 68% is spent on ‘doing stuff,’ spending time on various tasks, creating more tasks and attending meetings. Don’t we just love those meetings?
Common Mistakes to Avoid in Backup and Disaster Recovery
Reading Time: 4 minutes In today’s data-driven world, backup and disaster recovery have become crucial aspects of any business’s IT infrastructure.
10th October 2023 (Windows 2012)
Reading Time: 5 minutes You would be absolutely right in thinking that the date 10th October, is only 10 weeks away from Christmas. However, the 10th of October 2023, is a very special day in its own right. It is in fact, the last day of support and security from Microsoft for Windows Server 2012, and Windows Server 2012/R2.
Exploring the Benefits of Microsoft 365 for Businesses
Reading Time: 5 minutes In today’s fast-paced and interconnected world, businesses are continually seeking ways to enhance productivity, streamline operations, and stay competitive.
Outsourced IT Support, Is it really worth it?
Reading Time: 6 minutes In today’s rapidly evolving business landscape, you’d be hard-pressed to find a business or sector that doesn’t rely on IT in one form or another.
The Crucial Role of a Chief Information Security Officer (CISO)
Reading Time: 5 minutes In today’s digital landscape, businesses face an ever-increasing threat of cyber-attacks and cybercrime. As organisations become more reliant on technology and data, the need for advanced security measures to protect against cyber threats has become paramount.
The Essential Components of a Reliable Backup and Disaster Recovery Strategy
Reading Time: 4 minutes Businesses today heavily rely on their data and IT infrastructure to operate smoothly and efficiently.
Lend Me Your Ear
Reading Time: 4 minutes The vast array of headset models can make choosing a suitable one somewhat daunting. In this short article I aim to help you identify a headset suitable for your needs.
The Benefits of Outsourced IT Support for Small and Medium-Sized Businesses
Reading Time: 4 minutes In today’s digital age, technology plays a crucial role in the success of small and medium-sized businesses (SMBs). However, managing and maintaining an efficient and secure IT infrastructure can be a daunting task for many SMBs.
Reviewing 365 Phishing Reports
Reading Time: 4 minutes In this guide, it will cover how to view the 365 Phishing reports as well how to check who has completed training if they have been caught out by a Phishing simulation.
SonicWall NetExtender SSL VPN
Reading Time: 5 minutes A VPN allows you to access resources on your office network from wherever you are. SonicWall NetExtender is a piece of software that can be installed on your laptop or desktop that initiates the VPN connection.
Mailbox Housekeeping
Reading Time: 5 minutes In an age where so much communication is electronic it’s easy to forget that your mailbox does have a finite size. Like a filing cabinet there is only so much you can store in it before it becomes full and you have to fillet out old documents to make way for newer ones.
MOVEit File CyberHack
Reading Time: 4 minutes Cybercriminals known as Cl0p ransomware group, thought to be part of a Russian crime ring, have exploited a newly discovered flaw within the popular MOVEit file transfer software.
Microsoft 365 Email Encryption
Reading Time: 3 minutes Although many people don’t realise it, an email is not a secure communication medium by default. Think of it like writing on a postcard and then posting it. Along it’s journey to the recipient anyone can read the contents.
Protecting Your Business from Cybersecurity Threats: Top Tips for Enhanced Security
Reading Time: 4 minutes Cybersecurity is not just about technology; it’s about people, processes, and awareness.” – Vishal Salvi In today’s digitally-driven world, businesses face an ever-growing threat landscape when it comes to cybersecurity. Cybercriminals are continuously devising new techniques to exploit vulnerabilities and compromise sensitive data. As a result, safeguarding your business from cyber threats has become more… Continue reading Protecting Your Business from Cybersecurity Threats: Top Tips for Enhanced Security
Antivirus vs EDR what’s the difference?
Reading Time: 5 minutes When the picture above was taken sometime in the early 80’s, Anti-Virus (AV) protection was almost unheard of. The idea that someone would create a malicious program that would cause your computer to fail was in its infancy.
How to setup a Microsoft 365 App Password
Reading Time: 4 minutes Some applications do not support Multi-factor authentication which can become a problem when Security defaults or Conditional Access have been enabled on a Microsoft 365 tenant. To overcome this we can create App Passwords that can be used to connect to Microsoft 365 Services for a specific application.
Mobile Device Enrolment – iPhone
Reading Time: 6 minutes This useful guide will take you through the steps of enrolling your iPhone with Microsoft’s Mobile Device Management so you really can keep your personal and work data separate.
Mobile Device Enrolment – Android
Reading Time: 6 minutes It’s quite normal to want to have access to email & your calendar on the move but what security considerations need to be taken into account to keep your personal data and company data separate?
Microsoft 365 MFA Setup Guide
Reading Time: 5 minutes Multi Factor Authentication (MFA) provides an additional level of security to your systems and helps combat cyber attacks. When you login to a service such as Remote Desktop Server or Microsoft 365 not only do you enter your username and password but also via the MFA app prompt you confirm it’s you
Protect your business with Cyber Essentials.
Reading Time: 5 minutes Today in the digital age, we store information electronically. Why? Because information is power; it can be our competitive advantage over other businesses. Our supplier list of who provides us with what, and when; it might be customer information, entrusted to us through a sales transaction and numerous other details, all particular to our business.
What is Patch Management?
Reading Time: 4 minutes Whatever your favourite canine might tell you, “Get off the sofa, stop chasing cars, begging for food, digging up the garden, or chewing the furniture”, whether your dog is called Patch or not, you’d be right in thinking, patch management is none of the above.
Mailbox Management
Reading Time: 5 minutes Email has given us a powerful medium to communicate across continents, or just to the other side of the room. With it comes a high volume of messages, many of which are “cakes in the kitchen” style and others that contain large attachments.