Latest from our business, security
and technology blog

Search the blog:

    2019-04-03 14:29:21

    Detox Your Digital

    No, we’re not talking about cutting down the time you spend on social media (but we’re quite happy to advocate that too). We’re talking about a corporate digital detox: a thorough audit and cleanse of your entire IT estate – and how to go about it.

    2019-03-26 10:23:23

    The (Free) First Step to Better IT!

    In over 30 years in IT, I still encounter many business owners and IT-decision makers who find themselves spending too much of their valuable time dealing with staff technology problems and continually looking for work-arounds to the IT issues.

    2019-03-18 11:15:43

    Office 365 Popularity Grows…as does its potential vulnerability

    Since its introduction, Microsoft’s Office suite products have clearly been the tools of choice for most of the world’s businesses - most of us using at least one of the applications on a daily basis.

    2019-03-11 07:30:17

    Are You Doing Enough on Mobile Device Security?

    We all want to do our best to keep our corporate data and systems safe. Each year, organisations invest millions in firewalls, anti-virus software, training and patching programmes. But how much of this is directed at mobile devices?

    2019-03-04 07:30:12

    How setting up SOPs can help you deal with IT points of failure

    Creating Standard Operating Procedures (SOPs) covering your core technology is valuable even within a small business. It will save you a lot of stress when having to deal with critical events and help your team when having to think and act under pressure. Moreover, setting up proactive actions will...

    2019-02-25 07:30:55

    Passwords: Can we live without them?

    For thousands of years, passwords have been used as a means of authentication; a way in which people could be confident that security was maintained.

    2019-02-18 13:35:36

    Windows Server 2008 R2 Approaching End of Life

    Are you still using Windows Server 2008 R2 within your business IT environment? If so, it’s time to start planning a migration strategy as the server technology approaches its end of life.

    2019-02-11 11:03:26

    Urgent Call to Action if You Are Using Windows 7

    Are you using the Windows 7 operating system on your PCs and laptops? If so, it is time to take action and start planning an upgrade to Windows 10.

    2019-01-14 07:30:31

    Advancing Your IT Strategy: How to Identify Critical Vulnerabilities and Points of Failure

    In a recent blog, we looked at the five steps required to develop an effective IT strategy. In this article, we will take a deeper look into one of these key stages: how to identify critical vulnerabilities and points of failure.