Blogs

Browse through our most recent articles to gain expert advice and recommendations for great hardware and software

How to Prevent Smishing

Smishing is a type of phishing that has been around for a long time but has become more prevalent and dangerous in recent years. We’re taking a look at what a smishing text is and how to prevent smishing from being dangerous to you. What Is a Smishing Text? Most people have heard of phishing […]

Read more

Office 365 Email Protection: Hidden Costs

There’s a popular misconception that any cloud solution provides everything your business needs, and you no longer need to worry about anything to do with your IT. Whilst cloud services, including Microsoft 365 email, do take away a lot of your pain in terms of having to buy servers and run expensive infrastructure in your […]

Read more

Cybersecurity for Remote Workers

It looks like working from home is here to stay to some extent for the foreseeable future, which means that cybersecurity for remote workers is more important than ever. With over 70% of people working from home at least once per week, if you aren’t already paying close attention to the cybersecurity risks of working […]

Read more

What Is Patch Management?

Currently, 57% of data breaches are attributed to poor patch management. This means that over half of data breaches are entirely preventable, but what is patch management? We’re going to take a look at what patch management is, the different types and importance of hardware and software patch management, and some handy advice for business […]

Read more

How Can You Spot a Phishing Email? The DAC Method

Any business can be targeted by a phishing attack, and most will be at some point, so it’s vital that you and your staff know how you can spot a phishing email. We know of a business that recently lost £22,000 to a phishing attack, and the scams are becoming more complex every day.

Read more

Easy Cyber Security Tips to Implement Today

Cyber Security is a growing nightmare. Businesses are losing money every day through Cyber Attacks. But you can add much more protection to your business and often for free. In this blog I will show you my four top tips to stay cyber secure. Multi-Factor Authentication My first tip is to use two-factor authentication on […]

Read more

How to recover from Ransomware

Last week on the 4th July, Independence Day in the US, there was a huge cyber attack. The hackers are demanding 70 million dollars in the form of a ransom payment. In this blog, I’ll tell you exactly what happened and how you can protect your business. You might have seen this on the news […]

Read more

Can you use Two-Factor Authentication without a Phone?

I heard an interesting statistic from Microsoft this week. They say that enabling two-factor authentication (2FA) on your Microsoft 365 account can reduce the chances of your account getting hacked by 99.9%. If that’s the case, then why wouldn’t everyone enable two-factor authentication? Every business should have it enabled for every individual in their firms.

Read more

How Bitlocker Can Protect your Business Data

According to a recent survey a laptop is lost or stolen every 53 seconds.  That is a lot of lost laptops! Whilst people always think that the value of a laptop comes from the physical device, it’s not uncommon for the data on the laptop to be uploaded and sold online.

Read more

Cyber Essentials for Small Businesses

You hear so much on the news and on social media about cyber attacks. But if you’re the owner of a business, what is the best way that you start your cyber security journey and get your business protected? The one thing I recommend to all of our customers is to get the Cyber Essentials […]

Read more