How to use your smartphone in the art of disconnecting

Reading Time: 3 minutes Switching off from work can be hard. There’s an expectation to be “always on”, where your personal life and your business world never separate. Here’s how to get a minute or two to practice the art of stone stacking.

Stay safe and secure: cyber tips for when you’re on the move

Reading Time: 5 minutes So, you’ve been going through your checklist before you fly off on your business trip: encrypt or delete sensitive files? CHECK. Tamper seals over the hard drive access points? CHECK. Spare USB port locks? CHECK, privacy screen? CHECK. Was it always like this?

Pen Testing – let me explain

Reading Time: 5 minutes In the IT industry, we have a penchant for acronyms. If we can condense the name of a service, product, or piece of equipment into just three letters, we’re as happy as a lark.

SonicWall SSLVPN – Enhanced (SMA)

SSL VPN. Virtual private network. Encrypted connection.

Reading Time: 4 minutes A VPN allows you to access resources on your office network from wherever you are. SonicWall NetExtender is a piece of software that can be installed on your laptop or desktop that initiates the VPN connection.

What you need to know about the PSTN switch-off

Image of optical fibers with binary codes. internet connection with fiber

Reading Time: 2 minutes Every technology has its day and now, it’s time to take the next step forward in the evolution of telecommunications.

Business showdown: cloud service vs. on-premise solutions

Reading Time: 5 minutes In the late autumn of 1965, the Rolling Stones released ‘Get off my cloud’. It’s one of the band’s signature tunes, reaching the number-one spot in the UK, the US, Canada and Germany. They could have never imagined that the title of their song would have such relevance today.

Staying one step ahead: phishing, vishing, and smishing

Studio shot of a handsome young man using a laptop and looking stressed against a white background

Reading Time: 4 minutes Phishing, vishing, and smishing sound like the names of small villages on a beautiful coastline in some faraway paradise, but I can assure you these names stand for something completely onerous.

The ultimate guide to protecting your company from cyber threats

Portrait of happy African businesswoman holding digital tablet standing in the office. Female entrepreneur at her startup office looking at camera and smiling.

Reading Time: 3 minutes You go into your office and find yourself locked out of your computer and, it gets worse you’re being asked for a ransom to retrieve your access, here’s how you can stop that.

Outsourced IT Support: Finding the Perfect Fit for Your Company

Guests throwing confetti over bride and groom as they walk past after their wedding ceremony. Joyful young couple celebrating their wedding day

Reading Time: 4 minutes Outsourced IT support is just like a marriage. It’s about finding an IT partner who is going to go through all the joys and wonders of business life, with your hand in hand.

Preparing for Cyber Essentials

Low angle view on a blue padlock made to resemble a circuit board and placed on binary computer code.

Reading Time: 4 minutes This guide is intended to set out the process of preparation and gaining the Cyber Essentials and/or Essentials Plus certification.

SonicWall SSLVPN – Standard

SSL VPN. Virtual private network. Encrypted connection.

Reading Time: 5 minutes A VPN allows you to access resources on your office network from wherever you are. SonicWall NetExtender is a piece of software that can be installed on your laptop or desktop that initiates the VPN connection.

Microsoft 365 Copilot – A Vision of Things to Come

Shot of a young businesswoman looking stressed out in a demanding office environment

Reading Time: 4 minutes We spend an average of about 37 hours a week at work, of which 68% is spent on ‘doing stuff,’ spending time on various tasks, creating more tasks and attending meetings. Don’t we just love those meetings?

Common Mistakes to Avoid in Backup and Disaster Recovery

Portrait of an attractive woman at the table with cup and laptop, book, notebook on it, grabbing her head. Bookshelf at the background, concept photo

Reading Time: 4 minutes In today’s data-driven world, backup and disaster recovery have become crucial aspects of any business’s IT infrastructure.

10th October 2023 (Windows 2012)

Pictures of Vintage Real Santa Claus carrying gift sack. This pictures a horizontal composition and ia wintery background.

Reading Time: 5 minutes You would be absolutely right in thinking that the date 10th October, is only 10 weeks away from Christmas. However, the 10th of October 2023, is a very special day in its own right. It is in fact, the last day of support and security from Microsoft for Windows Server 2012, and Windows Server 2012/R2.

Exploring the Benefits of Microsoft 365 for Businesses

Bucharest, Romania - June 04, 2022: View of Microsoft Romania headquarters in City Gate Towers situated in Free Press Square, in Bucharest, Romania.

Reading Time: 5 minutes In today’s fast-paced and interconnected world, businesses are continually seeking ways to enhance productivity, streamline operations, and stay competitive.

Outsourced IT Support, Is it really worth it?

Dissatisfied and upset woman at workplace looking at laptop screen, business woman received error and refusal of online banking transaction, female worker disappointed inside office.

Reading Time: 6 minutes In today’s rapidly evolving business landscape, you’d be hard-pressed to find a business or sector that doesn’t rely on IT in one form or another.

The Crucial Role of a Chief Information Security Officer (CISO)

Cropped shot of a mature businessman working on programming code

Reading Time: 5 minutes In today’s digital landscape, businesses face an ever-increasing threat of cyber-attacks and cybercrime. As organisations become more reliant on technology and data, the need for advanced security measures to protect against cyber threats has become paramount.

Lend Me Your Ear

Cropped shot of a handsome young man working in a call center with a female colleague in the background

Reading Time: 4 minutes The vast array of headset models can make choosing a suitable one somewhat daunting.  In this short article I aim to help you identify a headset suitable for your needs.

Reviewing 365 Phishing Reports

PHISHING Button on Computer Keyboard

Reading Time: 4 minutes In this guide, it will cover how to view the 365 Phishing reports as well how to check who has completed training if they have been caught out by a Phishing simulation.

Mailbox Housekeeping

Cropped shot of letters in a letter box

Reading Time: 5 minutes In an age where so much communication is electronic it’s easy to forget that your mailbox does have a finite size.  Like a filing cabinet there is only so much you can store in it before it becomes full and you have to fillet out old documents to make way for newer ones.

MOVEit File CyberHack

Hacker attack computer hardware microchip while process data through internet network, 3d rendering insecure Cyber Security exploit database breach concept, virus malware unlock warning screen

Reading Time: 4 minutes Cybercriminals known as Cl0p ransomware group, thought to be part of a Russian crime ring, have exploited a newly discovered flaw within the popular MOVEit file transfer software.

Microsoft 365 Email Encryption

Cyber Security, Phishing, E-Mail, Network Security, Computer Hacker, Cloud Computing

Reading Time: 3 minutes Although many people don’t realise it, an email is not a secure communication medium by default. Think of it like writing on a postcard and then posting it.  Along it’s journey to the recipient anyone can read the contents.

Protecting Your Business from Cybersecurity Threats: Top Tips for Enhanced Security

View at mature business woman explaining project details on a meeting in office

Reading Time: 4 minutes Cybersecurity is not just about technology; it’s about people, processes, and awareness.” – Vishal Salvi In today’s digitally-driven world, businesses face an ever-growing threat landscape when it comes to cybersecurity. Cybercriminals are continuously devising new techniques to exploit vulnerabilities and compromise sensitive data. As a result, safeguarding your business from cyber threats has become more… Continue reading Protecting Your Business from Cybersecurity Threats: Top Tips for Enhanced Security

Antivirus vs EDR what’s the difference?

Happy office worker sitting, typing, working, and selling big at 1970's or 1980's monochrome computer. Retro office interior scene. Wood Paneling and a water cooler in the background. Old retro vintage technology

Reading Time: 5 minutes When the picture above was taken sometime in the early 80’s, Anti-Virus (AV) protection was almost unheard of. The idea that someone would create a malicious program that would cause your computer to fail was in its infancy.

How to setup a Microsoft 365 App Password

Reading Time: 4 minutes Some applications do not support Multi-factor authentication which can become a problem when Security defaults or Conditional Access have been enabled on a Microsoft 365 tenant. To overcome this we can create App Passwords that can be used to connect to Microsoft 365 Services for a specific application.

Mobile Device Enrolment – iPhone

Reading Time: 6 minutes This useful guide will take you through the steps of enrolling your iPhone with Microsoft’s Mobile Device Management so you really can keep your personal and work data separate.

Mobile Device Enrolment – Android

Reading Time: 6 minutes It’s quite normal to want to have access to email & your calendar on the move but what security considerations need to be taken into account to keep your personal data and company data separate?

Microsoft 365 MFA Setup Guide

cyber security in two-step verification, multi-factor authentication, information security and encryption, secure access to user's personal information, secure Internet access, and cybersecurity.

Reading Time: 5 minutes Multi Factor Authentication (MFA) provides an additional level of security to your systems and helps combat cyber attacks. When you login to a service such as Remote Desktop Server or Microsoft 365 not only do you enter your username and password but also via the MFA app prompt you confirm it’s you

Protect your business with Cyber Essentials.

A male roman soldier in full uniform, armour, helmet, carrying a sword and dagger, standing and looking way from the camera, holding a spear - pilum near to a shield. The grand classical buildings of Ancient Rome, including the Colosseum are visible in the background at sunset.

Reading Time: 5 minutes Today in the digital age, we store information electronically. Why? Because information is power; it can be our competitive advantage over other businesses. Our supplier list of who provides us with what, and when; it might be customer information, entrusted to us through a sales transaction and numerous other details, all particular to our business.

What is Patch Management?

Reading Time: 4 minutes Whatever your favourite canine might tell you, “Get off the sofa, stop chasing cars, begging for food, digging up the garden, or chewing the furniture”, whether your dog is called Patch or not, you’d be right in thinking, patch management is none of the above.

Mailbox Management

Reading Time: 5 minutes Email has given us a powerful medium to communicate across continents, or just to the other side of the room.  With it comes a high volume of messages, many of which are “cakes in the kitchen” style and others that contain large attachments.