Search the blog:
Cyber Security - let’s call it what it really means – protecting yourself against Criminals. Modern cyber crime might be one of the biggest risks your business faces. It could cause you massive disruption, reputational damage or even ultimately to close shop. But how do you know your business is...
What are you doing to secure your business website and other web applications used in your business? If you run local browser (web) applications, they are probably secured with a variety of techniques, including firewalls, regular patching and network monitoring. But what happens when you are...
There’s a new attack vector in town: social media. Social is currently the fastest-growing type of phishing attack. Here’s what you need to know. We’ve covered phishing many times here on the Grant McGregor blog. We think it’s important to do so, because we all need to stay vigilant against the...
Grant McGregor’s guide “The Six Little-Known Secrets” of IT support highlights a few key factors you need to consider in order to get the very best from your IT company. In this blog, we take a look at secret #3: beware of choosing an IT support provider on the basis of price alone! Price is, of...
Organisations must revisit their operational strategies and business continuity planning in the wake of the COVID-19 pandemic. Here, the Grant McGregor team considers what this might mean for your business continuity planning and, especially, IT. In a recent blog, we looked at how the current...
Disaster recovery and business continuity plans should be revisited on a regular basis to ensure they remain fit for purpose. The current coronavirus pandemic has us all moving forward those DR/BC reassessment planning sessions. There can be few businesses around the world that haven’t found their...
Outsourcing IT isn’t just for large companies. Outsourcing IT often makes even more sense for smaller companies – giving you access to a breadth of skills and support you couldn’t otherwise afford.
We’re huge believers in the power of regular online training to help staff spot malicious email attacks. But what happens when that training pays off and you realise that you have a suspicious email in your inbox? What should your next move be?
It might not surprise you too much to learn that one of the most common questions we get asked in these days of COVID-19 is: can you help me with remote working? The answer is “yes”, of course. But there are a few vital issues you will need to consider.