Blogs

Browse through our most recent articles to gain expert advice and recommendations for great hardware and software

Is Zoom Secure For Business?

Zoom is such a great tool for remote working, but is it secure enough to be used in your business? That is what we’re going to look at in today’s blog post.  Increased Demand Since remote working became a thing, businesses have needed a way to communicate with staff, partners and customers.

Read more

CEO Impersonation Fraud

If you received an email from your manager asking you to pay £10,000 into a bank account urgently, would you do it? You might be surprised to hear that some people do. This type of scam is known as CEO fraud or CEO impersonation and it’s the topic for today’s blog.

Read more

What Is The Best Business Telephone System?

In this blog we’re going to talk about what the best telephone system is for your business. IT and Telecoms The technology behind telephone systems has changed alot since I first came into the IT industry. The IT system and the telephone system used to be two different systems – provided and supported by two […]

Read more

Ransomware Explained & How To Stop It From Happening!

What do you think is the biggest technology threat to your business? The answer is ransomware. In this blog, I will explain exactly what ransomware is, why you should be concerned and what you can do to protect yourself and your business.  NHS Ransomware Attack Ransomware hit national headlines in the UK in 2017, when […]

Read more

Backup VS Disaster Recovery

In this blog, I am going to introduce you to two concepts. Those are backup and and a term called business continuity.  As a business owner, it’s really important that you know what these two terms are and how  important they are to your business.

Read more

How Does A Phishing Attack Actually Work?

In one of my previous blogs we talked about phishing attacks; what they were and how you can protect yourself against them. In this blog, we’re going to delve a little bit deeper and talk about how hackers use phishing attacks to steal your money. Phishing is easy Cyber criminals love to hack into email? […]

Read more

What is the Best Computer for Business?

Buying a computer for your firm can be a tricky business. There are so many confusing technical specifications available, where do you start? In this blog, we’re going to look at what type of computer you should be using in your business.  To help you understand the different components inside of a PC, we’re going […]

Read more

What is a Windows Virtual Desktop?

Back in September of 2019, Microsoft released a new product called Windows Virtual Desktop.  In my opinion, Windows Virtual Desktop will be the product that most businesses will use in the next few years. I think it will have a similar adoption rate as Office 365. But what is a Windows Virtual Desktop (or WVD […]

Read more

What is Two Factor Authentication?

What is Two Factor Authentication?   One of the easiest, cheapest and best ways to increase your IT security is to use something called 2FA – or two-factor authentication.   2FA is also known as MFA (multi-factor authentication) or OTP (one-time password).   What does 2FA do?   Two-factor authentication adds a second layer of […]

Read more

What is a VPN?

In this guide, I will explain what a VPN is and what it does in a non-technical way.   Before we talk about what a VPN does, it might be helpful to explain what problem a VPN cures.

Read more