Latest from our business, security
and technology blog

Search the blog:

    2019-09-02 07:30:41

    Calling Last Orders on Windows 7!

    The Windows 7 operating system was launched by Microsoft on October 22, 2009, and there remain many people and organisations in the UK who are using it. If you’re one of them, you need to act now to upgrade before it goes out of support on January 14 next year.

    2019-07-03 09:33:24

    Grant McGregor Ranked Among World’s Most Elite 501 Managed Service Providers

    We’re delighted to let you know that we’ve been named as one of the world’s premier managed service providers on the prestigious 12th annual Channel Futures MSP 501 rankings.

    2019-05-20 10:16:02

    Can Outsourced IT and Internal IT Work Together?

    Outsourced IT and Internal IT provision is often posited as an either/or choice. On the contrary, says Grant McGregor, the relationship can be a highly successful collaboration.

    gazelles running in the bush
    2019-05-06 07:30:53

    Not Faster than the Lion

    Cyber threats are constantly evolving and growing. With breaches reported in the international press, it is easy to get lost in the white noise of cybercrime fear and misinformation. But there are some truly straightforward and clear steps that every business can take.

    2019-04-03 14:29:21

    Detox Your Digital

    No, we’re not talking about cutting down the time you spend on social media (but we’re quite happy to advocate that too). We’re talking about a corporate digital detox: a thorough audit and cleanse of your entire IT estate – and how to go about it.

    2019-02-25 07:30:55

    Passwords: Can we live without them?

    For thousands of years, passwords have been used as a means of authentication; a way in which people could be confident that security was maintained.

    2019-01-14 07:30:31

    Advancing Your IT Strategy: How to Identify Critical Vulnerabilities and Points of Failure

    In a recent blog, we looked at the five steps required to develop an effective IT strategy. In this article, we will take a deeper look into one of these key stages: how to identify critical vulnerabilities and points of failure.

    2019-01-07 07:30:49

    The Five Vital Components to Think About When Creating a New IT Strategy

    Developing an IT strategy can be a daunting task to start, especially if you’ve not done it before. Our new guide helps to demystify the process and offers a five-step approach to help you to get it done.

    2018-11-26 12:25:53

    Why IT Cannot Be a Reactive Activity

    So much of the IT activity we all undertake is reactive – often it takes a malware attack to prompt us to upgrade our security software or a broken hard drive to make us think seriously about backups. Which is exactly why your IT approach shouldn’t be reactive.

    1 2 3