Just as the internet transformed business processes and marketing, mobile technology is a game-changer for SMEs. Keeping up with the pace of technology can seem daunting, but there’s much to be gained from keeping up to speed with mobile technology and embracing the opportunities it offers.
Read MoreGrant McGregor Blog
Posts about
mobile friendly
How SMEs Can Benefit from Keeping Up to Speed with Mobile Technology
February 20, 2017
Pegasus CouriersJust wanted to say a big thank you to Dan for his help today. Above and beyond and very patient with a beginner like me.
- Read in full
Daniel Floyd, Pegasus Couriers
Categories
- Uncategorized (258)
- IT Security (203)
- IT Support (160)
- IT Service (146)
- Cyber Security (94)
- Advisory Guide (92)
- IT Consultancy (82)
- IT security (74)
- Managed IT Services (69)
- IT System Upgrade (66)
- IT Outsourcing (53)
- Microsoft (50)
- Cloud Services (46)
- Cyber Essentials (45)
- Grant McGregor (42)
- GDPR (38)
- security (37)
- IT support edinburgh (36)
- IT Equipment Supply (28)
- IT Project Delivery (28)
- technology (28)
- Grant McGregor Edinburgh (25)
- GFI Software (24)
- IT Audit (24)
- Network Management (23)
- Partner News (23)
- staff training (23)
- Cyber Essentials Plus (22)
- About Us (21)
- disaster recovery (21)
- Back Up (20)
- Cyber Attack (20)
- 2FA (19)
- Client (19)
- Data Leak Prevention (19)
- data breach (19)
- Malware (18)
- cybersecurity (18)
- two-factor authentication (18)
- Office 365 (17)
- password protection (17)
- phishing (17)
- ransomware (17)
- GFI Cloud (16)
- GFI LanGuard (16)
- social meda (16)
- social media (16)
- Edinburgh (15)
- Microsoft Office 365 (15)
- Microsoft Teams (15)
- Business (14)
- Cyber Essentials Certification (14)
- EndPoint Security (14)
- Grant McGregor IT (14)
- ICO (14)
- IT strategy (14)
- spear-phishing (14)
- Collaboration (13)
- Windows 10 (13)
- BYOD (12)
- GFI WebMonitor (12)
- SME (12)
- encryption (12)
- Cyber attacks (11)
- hackers (11)
- phishing attack (11)
- IT (10)
- NCSC (10)
- data security (10)
- mobile device management (10)
- productivity (10)
- remote working (10)
- updates (10)
- IT strategy guide (9)
- MFA (9)
- The Cloud (9)
- Windows 7 (9)
- multi factor authentication (9)
- Cyber Essentials Scheme (8)
- Information Commissioner's Office (8)
- Patch Management (8)
- backups (8)
- data (8)
- passwords (8)
- phishing attacks (8)
- CEO fraud (7)
- Cloud services (7)
- Email (7)
- GFI (7)
- GM Cyber Aware (7)
- IASME (7)
- IT Software and Solutions (7)
- IoT (7)
- Password Management (7)
- SharePoint (7)
- VPN (7)
- WhatsUp Gold (7)
- business continuity (7)
- cyber crime (7)
- cyber threats (7)
- cybercrime (7)
- data protection (7)
- personal data (7)
- security awareness training (7)
- working from home (7)
- Better IT Support Services (6)
- CE (6)
- Cloud (6)
- General Data Protection Regulation (6)
- IT partner (6)
- IT provider (6)
- Microsoft 365 (6)
- Virtualisation (6)
- anti-virus (6)
- backup (6)
- cloud migration (6)
- cyber security awareness training (6)
- managed service provider (6)
- software updates (6)
- spam (6)
- upgrade (6)
- Email Security (5)
- Email filtering (5)
- GFI EventsManager (5)
- IT Edinburgh (5)
- IT Management (5)
- IT Services (5)
- IT Support Advice (5)
- Job Opportunities (5)
- MDM (5)
- MSP (5)
- Microsoft Azure (5)
- O365 (5)
- Recovery Point Objective (5)
- SMEs (5)
- SaaS (5)
- Web Filtering (5)
- benefits (5)
- brexit (5)
- cyber security training (5)
- disaster recovery plan (5)
- internet of things (5)
- outsourcing (5)
- password security (5)
- patching (5)
- security measures (5)
- security risk (5)
- social engineering (5)
- viruses (5)
- Anti-Vitus Software (4)
- Apple (4)
- Application Performance Monitoring (4)
- Azure (4)
- BCDR (4)
- BCDR plan (4)
- Bring Your Own Device (4)
- Excel (4)
- GFI EndPoint Security (4)
- GFI VIPRE (4)
- Grant McGregor Ltd (4)
- IT Guide (4)
- IT housekeeping (4)
- IT security Edinburgh (4)
- IaaS (4)
- LinkedIn (4)
- Meet Your Team (4)
- Microsoft Intune (4)
- Network Monitoring (4)
- PowerPoint (4)
- RPO (4)
- RTO (4)
- SMB (4)
- WFH (4)
- access control (4)
- business continuity plan (4)
- compliance (4)
- connectivity (4)
- covid-19 (4)
- cybersecurity training (4)
- data backup (4)
- human firewall (4)
- marketing (4)
- phishing scams (4)
- protect your data (4)
- recovery (4)
- secure data (4)
- security policy (4)
- security updates (4)
- software (4)
- strong passwords (4)
- AI (3)
- Active Discovery (3)
- Award (3)
- Axcient (3)
- Cloud storage (3)
- Cloudfinder (3)
- Cyber Essentials Certifying Body (3)
- EU (3)
- Email Management (3)
- Facebook (3)
- GFI Wireless Sentry (3)
- HR (3)
- ISO 27001 (3)
- IT Infrastructure (3)
- IT Solutions (3)
- IT Support Partner (3)
- IT estate (3)
- IT manager (3)
- IT project delivery (3)
- IT strategy development (3)
- IT support services (3)
- IT upgrade (3)
- IT vulnerabilities (3)
- Instagram (3)
- Laptop backup (3)
- LogicNow (3)
- Microsoft Office (3)
- Microsoft Teams Guide (3)
- Network Security (3)
- OneDrive (3)
- Outlook (3)
- Outsourced IT (3)
- Password (3)
- RDS (3)
- Recovery Time Objective (3)
- Remote technology (3)
- Robotic process automation (3)
- Security Breach (3)
- Server Virtualisation (3)
- Small Businesses (3)
- Twitter (3)
- Windows 8 (3)
- Word (3)
- antivirus (3)
- apps (3)
- business owner (3)
- choosing an IT partner (3)
- cloud backup free trial (3)
- co-sourcing (3)
- collaboration tools (3)
- customer data (3)
- customer service (3)
- cyber criminals (3)
- data breaches (3)
- data management (3)
- data recovery (3)
- employee training (3)
- five-step IT strategy guide (3)
- free IT guide (3)
- hardware (3)
- information asset register (3)
- mobile devices (3)
- patches (3)
- phishing emails (3)
- remote access (3)
- security patches (3)
- security software (3)
- software up to date (3)
- software update (3)
- solutions (3)
- staff cyber security training (3)
- stolen laptop (3)
- storage (3)
- teamwork (3)
- testing (3)
- upgrades (3)
- zero trust (3)
- 12 step cyber security checklist (2)
- 2-factor authentication (2)
- 24/7 monitoring (2)
- 3D printing (2)
- Award winning product (2)
- Axcient x360 Cloud (2)
- BYOD policy (2)
- Back-up Recovery (2)
- Carphone Warehouse (2)
- Centre (2)
- Cloud back-up (2)
- Competitive Advantage (2)
- Computer Security Awards (2)
- Cross-Site Scripting (2)
- Cyber Essentials Certificate (2)
- Cyber Essentials Edinburgh (2)
- Cyber Essentials security standard (2)
- Cyber Essentials vouchers (2)
- CyberEssentials (2)
- DUO (2)
- DUO solution (2)
- Data Protection Officer (2)
- Datto (2)
- Employee Monitoring (2)
- End Point Security (2)
- GDPR compliance (2)
- GFI Archiver (2)
- GFI Events Manager 2013 (2)
- Google (2)
- Government Security Standard (2)
- IASME accreditation (2)
- IP address locking (2)
- IT Services Guide (2)
- IT Software (2)
- IT Support Company (2)
- IT Systems Upgrade (2)
- IT activity (2)
- IT appraisal (2)
- IT company (2)
- IT expenditure (2)
- IT guide Grant McGregor (2)
- IT managers (2)
- IT network (2)
- IT plan (2)
- IT policies (2)
- IT predictions (2)
- IT process (2)
- IT refresh (2)
- IT refresh strategy (2)
- IT security concerns (2)
- IT security policy (2)
- IT strategies (2)
- IT support Scotland (2)
- Internet Explorer (2)
- Internet Explorer end of life (2)
- Internet connection (2)
- Ipswitch (2)
- LFI (2)
- Layered Security (2)
- Local File Inclusion (2)
- Lost Email (2)
- MAX MailProtection (2)
- Microsoft SharePoint (2)
- Microsoft Windows 10 (2)
- Microsoft backup (2)
- Missing Email (2)
- National Cyber Security (2)
- National Cyber Security Centre (2)
- OWASP (2)
- Office 2010 (2)
- Office Move (2)
- OneNote (2)
- PaaS (2)
- QuickBooks (2)
- RFI (2)
- Remote Desktop Services (2)
- Remote File Inclusion (2)
- SQL injection (2)
- SQLi (2)
- SharePoint Online (2)
- UK businesses (2)
- Virtual Private Networks (2)
- WannaCry virus (2)
- Web Security (2)
- Windows (2)
- Windows 7 end of life (2)
- Windows 8.1 (2)
- Windows Server 2008 R2 end of life (2)
- XSS (2)
- Zero 2 Hero (2)
- adware (2)
- anti-spam (2)
- anti-virus protection (2)
- anti-virus software (2)
- antimalware (2)
- applications (2)
- are your web applications secure? secure websites (2)
- artificial intelligence (2)
- auditing (2)
- backup services (2)
- backup software (2)
- backup solutions (2)
- bad weather (2)
- bank statements (2)
- best practice password security (2)
- browsing online safely (2)
- brute-force protection (2)
- business data (2)
- business network (2)
- business protection (2)
- business security (2)
- business strategy (2)
- captcha code (2)
- cloud backup (2)
- cloud computing (2)
- cloud solutions (2)
- cloud technologies (2)
- communication (2)
- complex password (2)
- confidential information (2)
- connections (2)
- contingency plan (2)
- control access (2)
- coronavirus (2)
- corporate owned devices (2)
- cost of poor IT support (2)
- costs (2)
- critical vulnerabilities (2)
- customer feedback (2)
- cyber essentials plus certification (2)
- cyber resilience (2)
- cyber security controls (2)
- cybercriminals (2)
- dark net (2)
- dark web (2)
- data handling practices (2)
- data hygiene (2)
- data integrity (2)
- data privacy (2)
- digitalisation (2)
- easy steps (2)
- education (2)
- effective IT strategy (2)
- email archiving (2)
- email scams (2)
- email scanning tools (2)
- email security solution (2)
- employee absence (2)
- employees (2)
- employer brand (2)
- features (2)
- firewall (2)
- firewalls (2)
- flexibility (2)
- free Cyber Essentials guide (2)
- free IT strategy guide (2)
- free guide (2)
- guide (2)
- hacking (2)
- help guide (2)
- hidden costs (2)
- hiring staff (2)
- home working (2)
- iPad (2)
- insider threat (2)
- install security patches (2)
- least privilege (2)
- locally hosted software (2)
- lock devices (2)
- log out of accounts (2)
- malicious hackers (2)
- malware attack (2)
- mobile security (2)
- mobile technology (2)
- monitoring user accounts (2)
- multifactor authentication (2)
- multiple verification (2)
- network (2)
- new WFH rules (2)
- organise (2)
- out of office (2)
- out-of-date software (2)
- parental controls (2)
- password lockout (2)
- password policy (2)
- phishing email (2)
- phishing red flags (2)
- plan your handovers (2)
- planning (2)
- points of failure (2)
- prevent data breach (2)
- privacy settings (2)
- proactive approach to IT (2)
- project management (2)
- protect devices while on holiday (2)
- protect your devices (2)
- protect your organisation (2)
- protection (2)
- ransomware attack (2)
- ransomware protection (2)
- reactive IT (2)
- recruitment (2)
- red flags (2)
- reduce threats (2)
- reputable retailers (2)
- restore (2)
- return to operation (2)
- review user access rights (2)
- router (2)
- safeguard your childrens devices (2)
- secure passwords (2)
- secure payment pages (2)
- secure remote connectivity solutions (2)
- secure web applications (2)
- secure your IT (2)
- secure your devices (2)
- security assessment (2)
- security best practice (2)
- security policies (2)
- security procedures (2)
- security risks (2)
- security standards (2)
- security vulnerabilities (2)
- security while on holiday (2)
- shop safely (2)
- social attack vendors (2)
- social media phishing (2)
- software patches (2)
- spam filters (2)
- spring clean (2)
- spyware (2)
- stolen phone (2)
- strategy development (2)
- stronger passwords (2)
- summer holidays (2)
- switch IT provider (2)
- switch to Microsoft Teams (2)
- targeted phishing attack (2)
- technological change (2)
- technology solutions (2)
- templates (2)
- trusted partner (2)
- two-step verification (2)
- unsecured networks (2)
- update software (2)
- upgrade to Windows 10 (2)
- user account management (2)
- user account permissions (2)
- user accounts (2)
- user error (2)
- user management best practice (2)
- virtualisation (2)
- vulnerabilities (2)
- web app software (2)
- web application vulnerability (2)
- website (2)
- website security (2)
- windows 7 upgrade (2)
- windows vista (2)
- wireless (2)
- worms (2)
- 2016 technology trends (1)
- 2019 (1)
- 2019 MSP 501 winners (1)
- 2019 tech trends (1)
- 2020 (1)
- 2021 (1)
- 24/7 Monitoring/ Educating employees (1)
- 25th May 2018 (1)
- 29th July 2015 (1)
- 2FA in workplace (1)
- 365 Availability (1)
- 5 step guide (1)
- 5G development (1)
- 6 secrets of IT support (1)
- 7-step plan (1)
- ALTO (1)
- AMD (1)
- AR (1)
- ARM (1)
- AWS Amazon Web Service (1)
- About (1)
- Accounts Systems (1)
- Activity API (1)
- Adobe Acrobat Reader DC (1)
- Alter 'mark as read' (1)
- Android (1)
- App Control (1)
- Archiver (1)
- Are you doing enough to protect your data? (1)
- Article 17 (1)
- Augmented Reality (1)
- Axcient x360Cloud (1)
- B2B (1)
- B2B marketing (1)
- BCDR solutions (1)
- BCDR test (1)
- BDR (1)
- Bad Romance (1)
- Baillie Signs (1)
- Basecamp (1)
- Best UK GFI Partner (1)
- BitDefender (1)
- BitDefender Gravity Zone (1)
- BitDefender features (1)
- Brexit deal (1)
- British businesses (1)
- Business Internet Usage (1)
- Business Premium (1)
- Business goals (1)
- Buy GFI LanGuard (1)
- CE Certifying Body (1)
- CE Trusted Partner (1)
- CE certificate (1)
- CE voucher deadline (1)
- CE vouchers for charities (1)
- CEO scam (1)
- CEOs (1)
- CIO (1)
- CMDB (1)
- CPU (1)
- CPU bugs (1)
- CRM (1)
- CRM online (1)
- CRM software (1)
- CRM system (1)
- CSAT (1)
- California Consumer Privacy Act (1)
- Calling Last Orders on Windows 7 (1)
- Cambridge Analytica scandal (1)
- Canyoning (1)
- Car livery (1)
- Carphone Warehouse data breach (1)
- Carphone Warehouse fine (1)
- Central Belt (1)
- Central Scotland (1)
- Change Configuration Management (1)
- Channel Futures MSP 501 rankings (1)
- Chief Information Officer (1)
- Christmas (1)
- Cloud adoption (1)
- Cloud service provider (1)
- CoAuthoring (1)
- Community Partner (1)
- Computer (1)
- Containers (1)
- ControlNow (1)
- CrySiS (1)
- CryptON (1)
- CryptoLocker (1)
- Crystal Ball (1)
- Customer Satisfaction (1)
- Cyber Essentials Scotland (1)
- Cyber Essentials Security Accreditation (1)
- Cyber Essentials event (1)
- Cyber Essentials event Edinburgh (1)
- Cyber Essentials for business (1)
- Cyber Essentials guide (1)
- Cyber Essentials information (1)
- Cyber Essentials standard (1)
- Cyber Essentials voucher (1)
- Cyber Essentials voucher scheme (1)
- Cyber Voucher (1)
- DDOS (1)
- DDoS attacks (1)
- DDos attachks (1)
- DDos protection (1)
- DLP (1)
- DPIA (1)
- DPO (1)
- Data Protection Act (1)
- Data Protection Act 1988 (1)
- Data Protection Act 2018 (1)
- Data Protection Impact Assessments (1)
- David Lawrence (1)
- Delve (1)
- Desktop (1)
- Directors (1)
- Dixons (1)
- Docker Support (1)
- Download GFI LanGuard (1)
- Dynamics (1)
- EMM (1)
- EU citizens data (1)
- EU legislation (1)
- EU standard (1)
- Edinburgh Evening News (1)
- Edinburgh IT company (1)
- Endpoint Manager (1)
- Enterprise Mobility Management (1)
- Enterprise Resource Planning (1)
- Eurofins (1)
- Eurofins ransomware (1)
- European Union (1)
- European Union legislation (1)
- Exchange 2010 (1)
- Exchange Online (1)
- External Hard Drives (1)
- Fife (1)
- Fifty Five and Five (1)
- Find My Device (1)
- Find my iPhone (1)
- Firefox (1)
- Fraud Prevention (1)
- Free Webinar (1)
- Freshbooks (1)
- GDPR aftermath (1)
- GDPR compliance Cyber Essentials (1)
- GDPR customer relationship (1)
- GDPR deadline (1)
- GDPR fines (1)
- GDPR privacy notice (1)
- GDPR standards (1)
- GDPR what's next (1)
- GDPR-compliant (1)
- GFI Events Manager (1)
- GFI LanGard (1)
- GFI LanGuard Review (1)
- GFI MAX (1)
- GFI MailEssentials (1)
- GFI Viper (1)
- GM MDM (1)
- General Data Protection Regulations (GDPR) (1)
- Glasgow (1)
- GoCo (1)
- Google Chrome (1)
- Government-backed Cyber Essentials (1)
- Grant McGrego (1)
- Grant McGregor Christmas opening times (1)
- Grant McGregor IT Strategy Guide (1)
- Grant McGregor team (1)
- Grant McGregor top MSP (1)
- Grovo (1)
- HDD (1)
- Happy New Year (1)
- Hootsuite (1)
- Host Gardian Service (1)
- Hosted Services (1)
- HubSpot (1)
- Human Rights Act (1)
- IAR (1)
- IASME Gold (1)
- IASME Governance (1)
- IASME Governance standard (1)
- IBC (1)
- ICI (1)
- IE10 (1)
- IE11 (1)
- ISMS (1)
- ISO/IEC 27018 (1)
- ISP (1)
- IT Jobs Scotland (1)
- IT SOPs (1)
- IT Security Standard (1)
- IT Security breaches (1)
- IT Services Company (1)
- IT Services company in Edinburgh (1)
- IT Suppor Provider (1)
- IT Support Job Edinburgh (1)
- IT Support Provider (1)
- IT Support Technician (1)
- IT Systems Audit (1)
- IT advisory guide (1)
- IT asset list (1)
- IT audit and appraisal (1)
- IT audits (1)
- IT change (1)
- IT cleanse (1)
- IT collaboration (1)
- IT companies Edinburgh (1)
- IT company Edinburgh (1)
- IT consultanc (1)
- IT education (1)
- IT equipment (1)
- IT equipment replacement (1)
- IT error (1)
- IT expertise (1)
- IT issues (1)
- IT lifecycle (1)
- IT maintenence (1)
- IT operations (1)
- IT outsource supplier (1)
- IT partnership (1)
- IT perimeter (1)
- IT planning (1)
- IT predictions for 2018 (1)
- IT productivity (1)
- IT professional (1)
- IT provider Edinburgh (1)
- IT provider warning signs (1)
- IT refresh policy (1)
- IT security awareness training (1)
- IT security risks (1)
- IT security services (1)
- IT security threat (1)
- IT security threats (1)
- IT service Edinburgh (1)
- IT service management (1)
- IT service provider (1)
- IT services partner (1)
- IT spend (1)
- IT spending (1)
- IT spring clean (1)
- IT staff (1)
- IT strategy for SMEs (1)
- IT strategy plan (1)
- IT supplier (1)
- IT support company edinburgh (1)
- IT support cost (1)
- IT support outsourcing edinburgh (1)
- IT support price (1)
- IT support service edinburgh (1)
- IT system (1)
- IT system audit (1)
- IT systems (1)
- IT systems update (1)
- IT team (1)
- IT training (1)
- IT trends (1)
- IT upgrades (1)
- IaaS Infrastructure as a Service (1)
- Identity and access management (1)
- Incident and Problem Management procedure (1)
- Increased Email Size (1)
- Information Commisioner's Office (1)
- Information Commissioner (1)
- Information Security Management (1)
- Information Security Management System (1)
- Information Security System Audit (1)
- Intel (1)
- Intelligent Business Continity (1)
- International Electrotechnical Commission's standa (1)
- Internet Bandwidth (1)
- Internet Explorer 10 (1)
- Internet Explorer 11 (1)
- Internet Service Provider (ISP) (1)
- Internet traffic (1)
- IoT security (1)
- Is it time you outsourced your IT? (1)
- It nightmares (1)
- January sales (1)
- John Aithie (1)
- KTwo (1)
- Kevin Mitnick (1)
- Keyboard shortcuts (1)
- KnowBe4 (1)
- LOGICcards (1)
- Laptop data (1)
- Lothian (1)
- Luminous Creative (1)
- MAX Backup & Disaster Recovery (1)
- MAX Mail (1)
- MAX Remote Management (1)
- MAX Risk Intelligence (1)
- MAX Service Desk (1)
- MDM software (1)
- MDM solution (1)
- MDM strategy (1)
- ML technologies (1)
- MOVEit (1)
- MOVEit Transfer (1)
- MSP Edinburgh (1)
- Magento security breach (1)
- Managed Antivirus (1)
- Managed IT Support (1)
- Managed Service Providers (1)
- Managed Web Protection (1)
- Meltdown (1)
- Mention (1)
- Microsoft Authorized Education Reseller (1)
- Microsoft Business (1)
- Microsoft Business Voice (1)
- Microsoft Cloud Services Partner (1)
- Microsoft Defender (1)
- Microsoft Edge (1)
- Microsoft Graph (1)
- Microsoft Home (1)
- Microsoft Office 365 subscription model (1)
- Microsoft Project (1)
- Microsoft Publisher (1)
- Microsoft RDP (1)
- Microsoft Word (1)
- Microsoft operating system (1)
- Microsoft outlook (1)
- Microsoft partner (1)
- Microsoft products (1)
- Microsoft subscription (1)
- Microsoft subscription price (1)
- Microsoft suite (1)
- Microsoft technical support (1)
- Microsoft upgrades (1)
- Midlothian (1)
- Mimecast (1)
- Modular technology (1)
- Monitoring Software (1)
- Multi-party HD Video Conferencing (1)
- NCA (1)
- NCSC report (1)
- NHS cyber attack (1)
- Nae Limits (1)
- Nano Server (1)
- Nested Virtualisation (1)
- O365 price (1)
- O365 subscription (1)
- OS upgrades (1)
- Office (1)
- Office 365 advantages (1)
- Office 365 for home business and students (1)
- Office 365 packages (1)
- Office 365 vulnerabilities (1)
- Office applications (1)
- OneDrive for Business sync (1)
- Our Clients (1)
- PC (1)
- PC breakdown (1)
- PC cost (1)
- PC hardware (1)
- PC issues (1)
- PCs (1)
- PDF Reader (1)
- PECR (1)
- PIN number (1)
- Patching solutions (1)
- People Per Hour (1)
- Per-file Encryption (1)
- Pinterest (1)
- Planner (1)
- Power BI (1)
- Powershell (1)
- Privacy and Electronic Communications Regulations (1)
- Procuring (1)
- Proofpoint (1)
- Publisher (1)
- RAM (1)
- RDP (1)
- RDP attacks (1)
- RDP ports (1)
- RDP vulnerabilities (1)
- RDS server (1)
- Red Snow Alert (1)
- Regulation of Investigatory Powers Act (1)
- Regulations (1)
- Remote Desktop Protocol (1)
- SBRC (1)
- SCVO (1)
- SIRIS (1)
- SMBs (1)
- SME predictions 2020 (1)
- SOP (1)
- SOPs (1)
- SSD (1)
- SSH encrypted (1)
- SSO (1)
- SUPEE-5344 (1)
- Safari (1)
- Sage (1)
- Sage Accounting 2015 (1)
- Salesforce (1)
- SamSa (1)
- Scotland (1)
- Scottish Business Resilience Centre (1)
- Scottish Council for Voluntary Organisations (1)
- Scottish Enterprise (1)
- Scottish Government (1)
- Security Solutions (1)
- Security and Information Governance (1)
- Security bug (1)
- Security threat (1)
- Server (1)
- Shadow IT (1)
- SharePoint Server (1)
- Six Secrets to Better IT guide (1)
- Skype for business (1)
- Slack (1)
- Snappa (1)
- Software Solutions (1)
- Software and IT Asset configuration management (1)
- Software as a Service (SaaS) (1)
- SolarWinds (1)
- Spectre (1)
- Staff News (1)
- Standard Operating Procedures (1)
- State of Email Security Report (1)
- Storage Spaces Direct (1)
- Stress Survey (1)
- Symantec Cloud (1)
- TakeControl (1)
- Team Building (1)
- Technical Account Manager (1)
- Telecommunications Regulations (1)
- The Freak (1)
- Threat Track (1)
- ThreatTrack (1)
- ThreatTrack Security (1)
- TimeCamp (1)
- To-Do bar (1)
- Travelex (1)
- Travelex data breach (1)
- Trojan horses (1)
- UK (1)
- UK General Data Protection Regulation (1)
- UK citizens data (1)
- UK law (1)
- UK technology market (1)
- URL defense (1)
- USB Drives (1)
- Unison (1)
- Upwork (1)
- VIPRE Business (1)
- VM recovery (1)
- VR video (1)
- Virtual Memory (1)
- Volume (1)
- WEEE Directive (1)
- WUG (1)
- WatchGuard (1)
- Watermark (1)
- Web Browsers (1)
- Web Protection (1)
- WebInsights (1)
- WhatsUpGold (1)
- White water rafting (1)
- Why IT cannot be a reactive activity (1)
- Wi-Fi (1)
- Wi-Fi security (1)
- Windows 10 upgrade (1)
- Windows 7 operating system (1)
- Windows 7 replacement (1)
- Windows Autopilot (1)
- Windows SBS 2011 (1)
- Windows SBS Server 2003 (1)
- Windows Server 2003 (1)
- Windows Server 2008 R2 (1)
- Windows Server 2016 (1)
- Windows Virtual Desktop (1)
- Windows XP (1)
- Xero (1)
- Yammer (1)
- Youtube (1)
- Zenefits (1)
- access (1)
- access rights management (1)
- accidental deletion (1)
- accidental threat (1)
- active directory (1)
- activities (1)
- address risks (1)
- advanced machine learning (1)
- advanced threat protection (1)
- advancing your IT strategy (1)
- advantages of BYOD (1)
- advice (1)
- agricultural drones (1)
- ambient environments (1)
- analytics (1)
- announcement (1)
- anti-malware (1)
- antivirus software (1)
- antivirus solution (1)
- app store (1)
- application audit (1)
- application recovery (1)
- application software (1)
- application sourcing (1)
- appraisal audit (1)
- archive (1)
- assess IT (1)
- assess risk (1)
- assess risks (1)
- asset and inventory tracking (1)
- asset register (1)
- attack surface (1)
- attacks (1)
- attracting talent (1)
- audit (1)
- auditing systems (1)
- audits (1)
- authentication (1)
- auto-fills (1)
- automate (1)
- automated monitoring (1)
- automatic updates (1)
- automation (1)
- autonomous vehicles (1)
- avoid phishing scams (1)
- back to school (1)
- back up solutions (1)
- back-up regime (1)
- backup for SMEs (1)
- backup process (1)
- backup system (1)
- backup testing (1)
- bad passwords (1)
- bandwidth (1)
- beginner's guide to encryption (1)
- best patching practice (1)
- best practices (1)
- better job (1)
- better the devil (1)
- better value IT (1)
- big organisation (1)
- biometrics (1)
- bitcoin (1)
- black friday (1)
- blockchain (1)
- blog post (1)
- boost performance (1)
- boost productivity (1)
- boost your IT performance (1)
- brand awareness (1)
- brand profile (1)
- brand reputation (1)
- breaches (1)
- brute force (1)
- burstable services (1)
- business IT support (1)
- business challenges (1)
- business continuity plans (1)
- business continuity solutions (1)
- business improvements (1)
- business management (1)
- business mobile device (1)
- business operations (1)
- business plan (1)
- business process automation tools (1)
- business safety (1)
- business solutions (1)
- business to business marketing (1)
- business users (1)
- business vulnerabilities (1)
- businesses (1)
- cabling (1)
- calculator (1)
- campaign (1)
- can we live without passwords (1)
- carbon footprint (1)
- carbon neutral cloud provider (1)
- centralised data (1)
- certification (1)
- certifying body (1)
- change (1)
- change IT provider (1)
- change layout (1)
- channel moderation (1)
- charts (1)
- chatbots (1)
- check backups (1)
- chips (1)
- chipsets (1)
- christmas shopping (1)
- client data (1)
- close outlook properly (1)
- cloud computing solutions (1)
- cloud data storage (1)
- cloud initiatives (1)
- cloud provider (1)
- cloud security (1)
- cloud service (1)
- cloud technology (1)
- cloud-based collaboration tools (1)
- cloud-based security services (1)
- cloud-based server (1)
- cloud-based software (1)
- clutter (1)
- co-sourcing benefits (1)
- collaboration tool (1)
- collaboration tools & technologies (1)
- colour code (1)
- communications (1)
- company data (1)
- company devices (1)
- company mobile devices (1)
- company security (1)
- company systems (1)
- company values (1)
- competitive strategy (1)
- compromised password (1)
- computer hardware (1)
- computer protection (1)
- computer weekly (1)
- conference calling (1)
- confidential (1)
- confidential waste bins (1)
- consent for marketing (1)
- conserves space (1)
- consumer rights (1)
- content marketing (1)
- continuity (1)
- continuum (1)
- coronavirus phishing scam (1)
- coronavirus-related cybercrime (1)
- corporate VPN (1)
- corporate data leakage (1)
- cost (1)
- cost management service levels (1)
- cost of data breach (1)
- cost saving (1)
- cracking (1)
- create 'Favourites (1)
- creating IT strategy (1)
- creating an Information Asset Register (1)
- criminal risk (1)
- critical data (1)
- crute force attack (1)
- customer experience (1)
- cyber attack risk (1)
- cyber attackers (1)
- cyber awareness (1)
- cyber defences (1)
- cyber insurance (1)
- cyber security Edinburgh (1)
- cyber security breach (1)
- cyber security certificate (1)
- cyber security defences (1)
- cyber security education (1)
- cyber security experts (1)
- cyber security help (1)
- cyber security plan (1)
- cyber security practice (1)
- cyber security practices (1)
- cyber security risk (1)
- cyber security solutions (1)
- cyber security threat (1)
- cyber threat (1)
- cyber vulnerability (1)
- cyber-sercurity (1)
- cybersecurity awareness training (1)
- cybersecurity awareness training & testing for (1)
- cybersecurity training and testing (1)
- cybersquatting (1)
- dark web risk (1)
- darknet (1)
- darkweb (1)
- data analytics (1)
- data audit (1)
- data back up (1)
- data disaster (1)
- data governance (1)
- data leaks (1)
- data loss (1)
- data loss prevention software (1)
- data loss risk (1)
- data management policies (1)
- data privacy challenges (1)
- data privacy documentation (1)
- data privacy processes (1)
- data processes (1)
- data processing (1)
- data protection legislation (1)
- data protection policies (1)
- data residency (1)
- data retention policies (1)
- data security strategy (1)
- data sharing (1)
- data theft (1)
- data transfers (1)
- databases (1)
- datacentre (1)
- deep web (1)
- defence against hackers (1)
- delays (1)
- demands (1)
- design (1)
- desktop publishing (1)
- detox your digital (1)
- devices (1)
- difference between disaster recovery and business (1)
- digital alternatives (1)
- digital detox (1)
- digital document storage solution (1)
- digital infrastructure (1)
- digital processing (1)
- digital safety (1)
- digital security (1)
- digital skills (1)
- digital solutions (1)
- digital technology (1)
- digital transformation (1)
- digital workplace (1)
- direct marketing (1)
- disability campaign (1)
- disable add-ins (1)
- disaster (1)
- disaster recovery plans (1)
- disaster recovery process (1)
- disgruntled ex-employee (1)
- disruptive technologies (1)
- disruptive technology (1)
- document management (1)
- document storage (1)
- domain names (1)
- dotmailer (1)
- double up on your security (1)
- download IT strategy guide (1)
- downloads (1)
- downtime (1)
- driverless cars (1)
- drone technology (1)
- drones (1)
- eDiscovery (1)
- edinburgh IT support (1)
- edinburgh IT support company (1)
- educate employees (1)
- educate staff (1)
- educate users (1)
- education on cybersecurity (1)
- effective backup process (1)
- effective use (1)
- email compliance (1)
- email filtering service (1)
- email marketing (1)
- email phishing (1)
- email retention (1)
- email search (1)
- email security solutions (1)
- email threat (1)
- email viruses (1)
- embracing disruptive technology (1)
- employee development (1)
- employee devices (1)
- employee dismissal (1)
- employee leaving (1)
- employee support (1)
- employee termination (1)
- encrypt (1)
- encrypt data at rest (1)
- encrypt data in transit (1)
- encrypted login support (1)
- encrypting data (1)
- encryption policy (1)
- end of life support (1)
- end of summer (1)
- end of support (1)
- end of support for Windows 7 (1)
- end points (1)
- endpoint (1)
- environmental monitoring data (1)
- envy (1)
- erasure requests (1)
- eu referndum (1)
- experienced (1)
- experiences (1)
- explots (1)
- extended security updates (1)
- external IT (1)
- external IT support (1)
- external suppliers (1)
- false email addresses (1)
- festive season (1)
- festive spirit (1)
- festivities (1)
- file recovery (1)
- file transfer (1)
- filter web traffic (1)
- finance (1)
- fingerprints (1)
- first line of defence (1)
- five step guide (1)
- flexible working (1)
- flexible working practices (1)
- free event (1)
- free event Edinburgh (1)
- free upgrade (1)
- full disk encryption (1)
- functionalities (1)
- gaming computer (1)
- gartner (1)
- get the best from staff (1)
- gluttony (1)
- gmail (1)
- good passwords (1)
- grants for Cyber Essentials (1)
- graphics and video cards (1)
- greed (1)
- grow your business (1)
- guide to cloud security (1)
- hacked (1)
- halloween (1)
- handling confidential information (1)
- handling customer data (1)
- hardware asset list (1)
- hardware audit (1)
- hardware failure (1)
- hardware replacement (1)
- hardware updates (1)
- hashtags (1)
- health (1)
- help with remote working (1)
- helpdesk (1)
- high risk employees (1)
- hiring (1)
- holes (1)
- home network (1)
- home networks (1)
- home office (1)
- home users (1)
- home worker (1)
- home workers (1)
- homeworking (1)
- hotmail (1)
- how do I upgrade Windows 7 (1)
- how do you stop a phishing attack (1)
- how much does IT support cost (1)
- how to spot suspicious emails (1)
- how to stay safe when browsing online (1)
- humanity (1)
- hybrid backup solution (1)
- hybrid cloud (1)
- hyperconnected (1)
- iMac (1)
- iOS 8 (1)
- iOS devices (1)
- iPad Pro (1)
- iPhone (1)
- identify critical vulnerabilities and points of fa (1)
- identify weak spots (1)
- illnesses (1)
- images (1)
- implement new IT system (1)
- implementation testing (1)
- implementing (1)
- implementing change (1)
- importance of updates (1)
- improve efficiency (1)
- improve processes (1)
- improve productivity (1)
- improvement (1)
- improving office connectivity (1)
- in-house (1)
- in-house training (1)
- inbound marketing (1)
- increase efficiency (1)
- industry expert (1)
- information management practice (1)
- information management strategy (1)
- information security (1)
- infrastructure as a service (1)
- innovation (1)
- insecure data (1)
- insecure wireless networks (1)
- insider attacks (1)
- internal IT (1)
- internal IT advantages (1)
- internal and external IT work together (1)
- internet (1)
- internet explorer 10 upgrade (1)
- introduction to Cyber Essentials (1)
- invest in people (1)
- invest in training (1)
- junk email (1)
- key controls (1)
- key logging (1)
- knowledge (1)
- laptop breakdown (1)
- laptop hardware (1)
- large business (1)
- legacy apps (1)
- legal risks (1)
- legislation (1)
- legitimate interest (1)
- letting an employee go (1)
- life without passwords (1)
- lifecycle of IT assets (1)
- limit user access (1)
- links (1)
- lockable document storage cabinets (1)
- long term technology challenges (1)
- lost mobile device (1)
- lost smartphone (1)
- lust (1)
- mail filtering (1)
- maintenance (1)
- maintenance procedure (1)
- malicious attack (1)
- malicious threat (1)
- malware protection (1)
- malware security (1)
- managed archiving (1)
- managed threat prevention (1)
- managing critical business data (1)
- managing data (1)
- managing security (1)
- managing virtual work team (1)
- marketing calls (1)
- math (1)
- measures and controls (1)
- merry Christmas (1)
- merry Christmas from Grant McGregor (1)
- micro businesses (1)
- micro-perimiters (1)
- mobile device (1)
- mobile device security (1)
- mobile device security solution (1)
- mobile devises (1)
- mobile friendly (1)
- mobile malware (1)
- mobile responsive website (1)
- mobile search (1)
- mobile technologies (1)
- mobile workforce (1)
- mobilisation (1)
- mobility (1)
- modern working practices (1)
- monitoring rools (1)
- monitoring tools (1)
- move to Windows 10 (1)
- move to the cloud (1)
- move to the cloud to reduce carbon footprint (1)
- multi factor authentification (1)
- negligent threat (1)
- network access solutions (1)
- network equipment (1)
- network scanner (1)
- new IT provider (1)
- new Microsoft subscription model (1)
- new business continuity approach (1)
- new cyber security threat (1)
- new employee (1)
- new features (1)
- new normal (1)
- new rules for passwords (1)
- new season (1)
- new security threats (1)
- new solutions (1)
- new strategies (1)
- new technologies (1)
- new term (1)
- new version (1)
- new year (1)
- office connectivity (1)
- office wifi (1)
- on-device encryption (1)
- on-premise backup (1)
- on-premise server (1)
- one year since GDPR (1)
- online backup (1)
- online fraud (1)
- online scam (1)
- online security (1)
- online security threat (1)
- online share (1)
- online shopping (1)
- online tools (1)
- online training (1)
- operating procedures (1)
- operating systems (1)
- operational processes (1)
- optimise costs (1)
- organisation measures (1)
- organisational data (1)
- out-of-date hardware (1)
- outage (1)
- outsider attacks (1)
- outsource (1)
- outsource IT support (1)
- outsourced IT advantages (1)
- outsourced IT company (1)
- outsourced IT partner (1)
- overcharging (1)
- oversharing online (1)
- paperless (1)
- password blacklist (1)
- password generation tool (1)
- password manager (1)
- password policies (1)
- password practice (1)
- password spraying (1)
- password theft (1)
- password vault (1)
- patch vulnerabilities (1)
- permissions (1)
- personal attack (1)
- personal devices for work (1)
- phishers (1)
- phishing scam (1)
- phishing simulator (1)
- phishing training (1)
- phone line (1)
- phone system (1)
- physical and network recovery (1)
- pitfalls of BYOD (1)
- plan (1)
- planning and processes (1)
- platform as a service (1)
- platforms (1)
- policies & procedures (1)
- policy (1)
- poor IT service (1)
- poor service (1)
- post-breach procedures (1)
- potential risk (1)
- practical measures (1)
- practical steps (1)
- predictions 2020 (1)
- prepare (1)
- prevent cyber attack (1)
- prevent cyber attacks (1)
- prevent insider attacks (1)
- prevent malicious sites (1)
- prevent ransomware attacks (1)
- price (1)
- price increase (1)
- pride (1)
- principle of least privilege (1)
- prioritise (1)
- prioritise IT spend (1)
- privacy (1)
- private cloud (1)
- procedure (1)
- procedures (1)
- process (1)
- processing data (1)
- processing personal data (1)
- processor modules (1)
- processor speed (1)
- productivity applications (1)
- productivity apps (1)
- productivity apps for small businesses (1)
- professional IT team (1)
- project team (1)
- proof of consent (1)
- pros and cons (1)
- protect against email attack (1)
- protect against phishing (1)
- protect data (1)
- protect devices (1)
- protect information assets (1)
- protect resources (1)
- protect your brand (1)
- protect your business (1)
- protect your business from cyber crime (1)
- protect your company (1)
- protect your device (1)
- protection suite (1)
- protocols (1)
- public cloud (1)
- questions for IT providers (1)
- randomware (1)
- ransom fee (1)
- ransomware prevention (1)
- re-posting articles (1)
- rebrand (1)
- reciprocation (1)
- recover from cyber attack (1)
- recruitment tools (1)
- recrutiment (1)
- recycle IT equipment (1)
- reduce attack surface (1)
- reduce bandwidth (1)
- reduce carbon emissions (1)
- reduce costs (1)
- refresher training (1)
- registering for automatic upgrade (1)
- regulatory obligations (1)
- regulatory requirements (1)
- relevant IT (1)
- reliable (1)
- remote desktop (1)
- remote device location (1)
- remote team meetings (1)
- remote team members (1)
- remote wipe (1)
- remote wiping clause (1)
- remote working strategies (1)
- renewable energy (1)
- replace IT (1)
- replace your IT equipment (1)
- replacement equipment strategy (1)
- requirements (1)
- restoring (1)
- retention (1)
- review VPN (1)
- review security policies (1)
- revoking systems access (1)
- right to be forgotten (1)
- right to erasure (1)
- rights and control (1)
- risk analysis (1)
- risks (1)
- safe online browsing (1)
- sales (1)
- save time (1)
- scalability (1)
- scam (1)
- scam email (1)
- scammers (1)
- secure (1)
- secure devices (1)
- secure file transfer (1)
- secure firewalls (1)
- secure login (1)
- secure mobile devices (1)
- secure mobiles (1)
- secure my business (1)
- secure remote access (1)
- secure remote access technology (1)
- security advice (1)
- security and compliance (1)
- security audit (1)
- security certification (1)
- security checklist (1)
- security compromise (1)
- security consultant (1)
- security consultants (1)
- security controls (1)
- security cordon (1)
- security essentials awareness (1)
- security practice (1)
- security procedure (1)
- security processes (1)
- security solution (1)
- security specialists (1)
- security standard process (1)
- security strategy (1)
- security system (1)
- security threats (1)
- security threats 2020 (1)
- security tips (1)
- security tools (1)
- security training (1)
- security training cybersecurity training (1)
- sensitive data (1)
- shake up process (1)
- sharing personal data (1)
- shop safe online (1)
- short-term response plan (1)
- shredders (1)
- signals (1)
- six secrets guide (1)
- skills training (1)
- sloth (1)
- slow (1)
- small business (1)
- small organisation (1)
- smart cities (1)
- smart city (1)
- smart devices (1)
- social engineering risks (1)
- social media for SMEs (1)
- social media policy (1)
- social media presence (1)
- social media recruitment (1)
- social media security (1)
- social media security weak spot (1)
- social media targeting (1)
- social media tips (1)
- social media trends (1)
- social media vulnerabilities (1)
- social network (1)
- social phishing (1)
- social presence (1)
- social selling (1)
- software as a service (1)
- software asset list (1)
- software asset register (1)
- software upgrade (1)
- software vulnrabilities (1)
- spam filter (1)
- spoof attacks (1)
- spot a phishing attack (1)
- spot phishing attacks (1)
- spreadsheets (1)
- staff awareness (1)
- staff coaching (1)
- staff education (1)
- staff induction (1)
- staff skills training (1)
- standardise your procedures (1)
- staying safe online (1)
- stolen device (1)
- stolen mobile (1)
- stop phishing (1)
- stop ransomware (1)
- strategic training (1)
- strategies for surviving a cyber attack (1)
- strategy (1)
- strategy plan (1)
- subject matter experts (1)
- supply chain attacks (1)
- support (1)
- support calls (1)
- supporting work life balance through technology (1)
- suspect links (1)
- suspicious email (1)
- switch to Office 365 (1)
- switch your IT support provider (1)
- system restore (1)
- systems (1)
- systems audit (1)
- systems security (1)
- tackle employment barriers (1)
- targeted advertising (1)
- technical measures (1)
- technical support (1)
- technology for homeworkers (1)
- technology investment (1)
- technology issues (1)
- technology predictions (1)
- technology prices (1)
- technology review (1)
- technology roadmap (1)
- technology security policy (1)
- technology spending (1)
- technology spring clean (1)
- technology strategy (1)
- technology trends (1)
- technology trends 2019 (1)
- technology update (1)
- test BCDR plan (1)
- testers (1)
- the EU (1)
- the GDPR (1)
- the dangers of over-sharing online (1)
- the importance of online backup (1)
- the right to be forgotten (1)
- third parties (1)
- third party data (1)
- third party risk (1)
- third-party (1)
- top 10 technology trends (1)
- top 10 tips (1)
- top 250 (1)
- top 501 Managed Service Providers worldwide (1)
- top tips for IT (1)
- training session (1)
- training strategies (1)
- trending (1)
- trends (1)
- trick or treat (1)
- trojans (1)
- typo squatting (1)
- typosquatting (1)
- under skilled staff (1)
- unified approach (1)
- unlimited (1)
- unreliable (1)
- unsubscribe (1)
- up to date data and apps (1)
- update (1)
- update PC (1)
- update plans (1)
- updated software (1)
- updating (1)
- upgrade IT (1)
- upgrade PC (1)
- upgrade advice (1)
- upgrade browsers (1)
- upgrade hardware (1)
- upgrade software (1)
- upgrade technology (1)
- user issues (1)
- user-removable hardware (1)
- using technology for recruitment (1)
- value for money (1)
- verification (1)
- vetting (1)
- via websites (1)
- video calling (1)
- video conferencing (1)
- video marketing (1)
- videos (1)
- viral (1)
- virtual WAN (1)
- virtual assistants (1)
- virtual conferences (1)
- virtual meeting place (1)
- virtual office (1)
- virtual private network (1)
- virtual work team (1)
- virus scan (1)
- vishing (1)
- vital information (1)
- weak passwords (1)
- wearable devices (1)
- web filtering solutions (1)
- welikeit (1)
- whaling (1)
- what PC to buy (1)
- what computer hardware to buy (1)
- what data should I encrypt (1)
- what have we learnt since GDPR (1)
- what is RDP (1)
- what not to do when you lose your mobile device (1)
- what to do if you have lost your mobile phone (1)
- what to do when you lose your mobile device (1)
- where is my email (1)
- why SMEs should get expert help with cyber securit (1)
- why email filtering is more important than ever (1)
- why should I encrypt data (1)
- wifi connection (1)
- wifi encryption (1)
- windows 10 migration (1)
- windows server 2008 upgrade (1)
- winter (1)
- wired (1)
- withdrawal of support (1)
- work flexibility (1)
- work life balance (1)
- working remotely (1)
- wrath (1)
- zero day exploits (1)
- zero inbox (1)
- zero trust model (1)