Blogs

Browse through our most recent articles to gain expert advice and recommendations for great hardware and software

Is Zoom Secure For Business?

Zoom is such a great tool for remote working, but is it secure enough to be used in your business? That is what we’re going to look at in today’s blog post.  Increased Demand Since remote working became a thing, businesses have needed a way to communicate with staff, partners and customers.

Read more

CEO Impersonation Fraud

If you received an email from your manager asking you to pay £10,000 into a bank account urgently, would you do it? You might be surprised to hear that some people do. This type of scam is known as CEO fraud or CEO impersonation and it’s the topic for today’s blog.

Read more

What Is The Best Business Telephone System?

In this blog we’re going to talk about what the best telephone system is for your business. IT and Telecoms The technology behind telephone systems has changed alot since I first came into the IT industry. The IT system and the telephone system used to be two different systems – provided and supported by two […]

Read more

Ransomware Explained & How To Stop It From Happening!

What do you think is the biggest technology threat to your business? The answer is ransomware. In this blog, I will explain exactly what ransomware is, why you should be concerned and what you can do to protect yourself and your business.  NHS Ransomware Attack Ransomware hit national headlines in the UK in 2017, when […]

Read more

Backup VS Disaster Recovery

In this blog, I am going to introduce you to two concepts. Those are backup and and a term called business continuity.  As a business owner, it’s really important that you know what these two terms are and how  important they are to your business.

Read more

How Does A Phishing Attack Actually Work?

In one of my previous blogs we talked about phishing attacks; what they were and how you can protect yourself against them. In this blog, we’re going to delve a little bit deeper and talk about how hackers use phishing attacks to steal your money. Phishing is easy Cyber criminals love to hack into email? […]

Read more

How To Stay SAFE Online In 3 EASY Steps

When we talk about Cyber Security, we always talk about it in a business context. But what about you as an individual? What about your family? Cyber Security applies to you too. In this blog, I am going to introduce you to my 3-step process for securing you and your family.

Read more

The Best FREE Technology for Remote Working

Most of us are now working from home. This isn’t an easy task. I have two children who need homeschooling. We have two dogs who are running around. In between all of this, we need to do our day jobs and run our businesses.  Working from home also presents some technical challenges.

Read more

What is Two Factor Authentication?

What is Two Factor Authentication?   One of the easiest, cheapest and best ways to increase your IT security is to use something called 2FA – or two-factor authentication.   2FA is also known as MFA (multi-factor authentication) or OTP (one-time password).   What does 2FA do?   Two-factor authentication adds a second layer of […]

Read more

What is a VPN?

In this guide, I will explain what a VPN is and what it does in a non-technical way.   Before we talk about what a VPN does, it might be helpful to explain what problem a VPN cures.

Read more