Latest from our business, security
and technology blog

Search the blog:

    2018-01-22 12:37:56

    Could Co-Sourcing be the Solution You've Been Looking For?

    Asset lean might be the new mantra, but can that really apply to critical IT services when you are a small or medium sized business? How do you keep costs to a minimum without jeopardising operational performance?

    2018-01-16 15:18:08

    The Two New IT Vulnerabilities that Affect Nearly Everyone

    You’ve probably heard of Spectre and Meltdown by now – the two new vulnerabilities that researchers have identified as affecting chips from Intel, AMD and ARM. We take a look at the risk they pose and what you should be doing about them.

    2018-01-08 08:30:15

    Supporting Work Life Balance Through Technology

    Organisations in the UK have a legal obligation to consider employee requests to work flexibly.

    2018-01-01 09:47:27

    New Year... New IT Partner?

    Technology isn’t the starting point for many small businesses and start-ups – unless technology is your business.

    2017-12-18 15:08:35

    Should You Be Using Microsoft Teams?

    Office 365 offers huge benefits to SMBs in terms of simplifying and saving on essential IT services. However, in many businesses, it isn’t being used to its full potential.

    2017-12-14 12:29:06

    Merry Christmas from Grant McGregor

    With 2017 drawing to an end and the festive season upon us, the whole Grant McGregor team took some time out of work hours to celebrate and enjoy a Christmas lunch together.

    2017-11-20 15:09:02

    Are You Adequately Testing your Backup and Recovery Plans?

    2017-10-23 11:19:35

    The Beginner's Guide to Cloud Security

    As increasing numbers of businesses shift their workloads to the cloud, the security threat we face is changing. Where our data goes, the hackers follow – and now cloud attacks are on the rise.

    2017-10-16 09:35:51

    Protect Your Business from Insider Attacks

    When we discuss cyber-attacks it often refers to those that come from the outside – the ones that are typically high profiles cases, such as malware, hacking, DDOS and ransomware.

    1 2 3 4 5