Latest from our business, security
and technology blog

Search the blog:

    IT Trends 2025: Insights from Grant McGregor’s Experts

    What might the future of IT look like in 2025? We sat down with two of Grant McGregor's key experts, Doug Davey and Paul Sinclair. With years of experience and a deep understanding of the IT landscape, Doug and Paul shared their predictions for the trends, challenges and innovations that may to...

    Read More
    2025-01-09 09:13:49

    IT Trends 2025: Insights from Grant McGregor’s Experts

    What might the future of IT look like in 2025? We sat down with two of Grant McGregor's key experts, Doug Davey and Paul Sinclair. With years of experience and a deep understanding of the IT landscape, Doug and Paul shared their predictions for the trends, challenges and innovations that may to...

    2024-12-17 10:59:46

    2024 Tech Year in Review: Innovations, Challenges and Lessons Learned

    As we wrap up 2024, the tech industry has once again demonstrated its dynamic and ever-evolving nature. From advancements in cybersecurity to breakthroughs in artificial intelligence, this year has been a journey of growth, challenges, and transformative lessons.

    2024-12-11 14:16:06

    Guide: Cyber Security Training - Your Best Defence

    Cybercrime continues to evolve, and small and medium-sized businesses are some of the biggest targets. With fewer resources dedicated to security, these organisations are often seen as easy prey for cybercriminals.

    2024-12-03 15:52:38

    10 Reasons Why you Might Not Be Receiving Emails in 2025

    Email remains an essential communication tool in both personal and professional settings but despite continuous advancements in technology, a range of issues can still disrupt the smooth delivery of emails.

    2024-11-27 14:42:24

    Impersonation in Action: How Fake IT Support Threatens Your Security

    In the world of cybersecurity, there are few threats as deceptively simple yet devastatingly effective as social engineering. These attacks exploit the human element - tricking individuals into granting access, revealing sensitive information or performing actions that compromise their...

    2024-11-19 15:38:21

    Broadcom's Acquisition of VMWare: What It Means for Customers and Why You Should Consider Azure or AWS

    In a significant development within the tech industry, Broadcom's recent acquisition of VMWare has sent ripples across the market. While mergers and acquisitions often promise enhanced capabilities and expanded offerings, they also bring about changes that can significantly affect customers.

    2024-11-12 10:56:31

    5 Best Tips to Keep Your Device in Check

    In our increasingly digital world our devices are central to productivity, creativity and staying connected. However, wear and tear, software glitches and cluttered storage can slow your PC down over time making it less efficient.

    2024-11-05 09:57:45

    Why Consistent Email Signatures Matter - and How to Achieve them

    In today’s professional world, first impressions often happen online - and email remains a core part of that communication. For most companies the email signature is more than just contact details, it’s a direct representation of your brand. But when email signatures are inconsistent across an...

    2024-10-29 10:00:00

    Empower Your IT Skills Through Micro-Learning

    Empower your team with the flexibility and knowledge they need to grow. Learn how bite-sized videos can help you stay ahead in the fast-paced tech world. Boost your professional career, enhance productivity and make your daily tasks easier to manage with Grant McGregor's education portal.

    1 2 3 4 5