Search the blog:
IT can no longer simply be seen as just a support service for the different business units. It must be understood in the context of the value and transformation it can deliver for the business. And that has implications for how you deal with your IT service provider.
Outsourcing IT isn’t just for large companies. Outsourcing IT often makes even more sense for smaller companies – giving you access to a breadth of skills and support you couldn’t otherwise afford.
We’re huge believers in the power of regular online training to help staff spot malicious email attacks. But what happens when that training pays off and you realise that you have a suspicious email in your inbox? What should your next move be?
It might not surprise you too much to learn that one of the most common questions we get asked in these days of COVID-19 is: can you help me with remote working? The answer is “yes”, of course. But there are a few vital issues you will need to consider.
An SLA – or service level agreement – is the way you hold your service provider to account. Getting them right is, therefore, essential to ensuring you get the service you need – and will mean that you have the necessary mechanisms in place if things do go wrong.
Some of us have always had the flexibility of working from home whereas others have had it forced upon them due to current circumstances.
One of the major disruptions to business is unplanned employee availability. With the outbreak of Covid-19 (Coronavirus), more and more businesses are encouraging – some enforcing – remote working from home.
As we are all carefully watching the COVID-19 (Coronavirus) situation, Grant McGregor is actively taking steps to ensure the safety of our teams and the continuity of our operations. We’ve had disaster preparedness and business continuity plans in place for events such as COVID-19 for some time,...
According to the Verizon 2019 Data Breach Investigations Report, 62% of breaches not involving an Error, Misuse, or Physical action (in other words, wounds that weren’t self-inflicted) involved the use of stolen credentials, brute force, or phishing.