Search the blog:
Earlier this week, Microsoft announced changes to their commercial pricing for Microsoft 365 which is the first major price update since Office 365 was launched 10 years ago. See https://www.microsoft.com/en-us/microsoft-365/blog/2021/08/19/new-pricing-for-microsoft-365/
This is something none of us wants to experience. But it does happen. There’s a small fire in your office. No-one is hurt and everyone is safe. But the damage to your workplace is unbelievable. The flames. The heat. The smoke. And of course, the huge amounts of water used to put out the fire....
There’s a new attack vector in town: social media. Social is currently the fastest-growing type of phishing attack. Here’s what you need to know. We’ve covered phishing many times here on the Grant McGregor blog. We think it’s important to do so, because we all need to stay vigilant against the...
Over the year and a half, cyber criminals have exploited the uncertainty and change we’ve experienced as a result of the pandemic. Nevertheless, it’s important not to let that growing and evolving cyber threat distract us from another cyber security problem: the insider threat. Like so much of our...
Switching IT support companies needn’t be a headache – provided your new IT support partner takes a programmatic and practical approach to making the switch. We explain why. Here at Grant McGregor, we understand that the thought of switching IT support partners fills most people with dread.
We know that criminal cyber activity has increased since the beginning of the pandemic. Cyber criminals moved quickly to target the new vulnerabilities of our rapidly altered working arrangements. To meet these threats, the security and management of devices has become critical. Endpoint management...
Coming in at number 134 worldwide, 9 in the UK and 1st in Scotland – Grant McGregor once again makes it on to the prestigious MSP501 list.
Have you got a way to monitor the devices that access your data and applications on your network? How do you spot nefarious activity on the network? If you can’t answer either of these questions, this blog is for you. We’ll tell you about a quick, easy and low-fuss way to solve these problems....
Revealed: The real cost of insider attacks – and your strategy to prevent them