Latest from our business, security
and technology blog

Search the blog:

    2019-05-14 15:14:09

    Urgent Newsflash: End of Life for Internet Explorer 10 Brought Forward

    If your business uses Microsoft software (likely!), you’ve got a number of important upgrades approaching soon. The latest one to add to the list is Microsoft’s end of life announcement for its Internet Explorer IE10 web browser.

    2019-04-30 08:23:21

    Education, Education, Education

    Those of us of a certain age will remember the promise that things can only get better… and the mantra of “education, education, education”. It all seems a long way away today. The good news? When it comes to cybersecurity, things can get significantly better with a relatively small investment in...

    2019-03-26 10:23:23

    The (Free) First Step to Better IT!

    In over 30 years in IT, I still encounter many business owners and IT-decision makers who find themselves spending too much of their valuable time dealing with staff technology problems and continually looking for work-arounds to the IT issues.

    2019-03-18 11:15:43

    Office 365 Popularity Grows…as does its potential vulnerability

    Since its introduction, Microsoft’s Office suite products have clearly been the tools of choice for most of the world’s businesses - most of us using at least one of the applications on a daily basis.

    2019-02-18 13:35:36

    Windows Server 2008 R2 Approaching End of Life

    Are you still using Windows Server 2008 R2 within your business IT environment? If so, it’s time to start planning a migration strategy as the server technology approaches its end of life.

    2019-02-11 11:03:26

    Urgent Call to Action if You Are Using Windows 7

    Are you using the Windows 7 operating system on your PCs and laptops? If so, it is time to take action and start planning an upgrade to Windows 10.

    2019-01-14 07:30:31

    Advancing Your IT Strategy: How to Identify Critical Vulnerabilities and Points of Failure

    In a recent blog, we looked at the five steps required to develop an effective IT strategy. In this article, we will take a deeper look into one of these key stages: how to identify critical vulnerabilities and points of failure.

    2018-11-07 09:00:39

    Cyber Essentials Voucher Scheme worth up to £1000 launched in Scotland

    The Scottish Government has made funding available for a new voucher scheme to help Scottish businesses and charities achieve the National Cyber Security Centre's (NCSC) Cyber Essentials certification.

    2018-10-25 09:53:45

    Computer Hardware Basics: What To Buy and Why it’s Important

    We often get asked by our customers what sort of PC or laptop hardware to buy. Or what specification is right. Whether you're very tech-savvy and know your PC components inside out, or you haven't the foggiest what type of processor or hard-drive is best, it can be hard to decipher the technical...

    5 6 7 8 9