Search the blog:
Outsourced IT and Internal IT provision is often posited as an either/or choice. On the contrary, says Grant McGregor, the relationship can be a highly successful collaboration.
If your business uses Microsoft software (likely!), you’ve got a number of important upgrades approaching soon. The latest one to add to the list is Microsoft’s end of life announcement for its Internet Explorer IE10 web browser.
Those of us of a certain age will remember the promise that things can only get better… and the mantra of “education, education, education”. It all seems a long way away today. The good news? When it comes to cybersecurity, things can get significantly better with a relatively small investment in...
In over 30 years in IT, I still encounter many business owners and IT-decision makers who find themselves spending too much of their valuable time dealing with staff technology problems and continually looking for work-arounds to the IT issues.
Since its introduction, Microsoft’s Office suite products have clearly been the tools of choice for most of the world’s businesses - most of us using at least one of the applications on a daily basis.
Are you still using Windows Server 2008 R2 within your business IT environment? If so, it’s time to start planning a migration strategy as the server technology approaches its end of life.
Are you using the Windows 7 operating system on your PCs and laptops? If so, it is time to take action and start planning an upgrade to Windows 10.
In a recent blog, we looked at the five steps required to develop an effective IT strategy. In this article, we will take a deeper look into one of these key stages: how to identify critical vulnerabilities and points of failure.
The Scottish Government has made funding available for a new voucher scheme to help Scottish businesses and charities achieve the National Cyber Security Centre's (NCSC) Cyber Essentials certification.