Technology Blog

How To Work From Home & Be Productive

Making the most of working from home Since the outbreak of Covid 19 hit the UK back in March, working from home has become normal for many. Personally I’ve got used to it and I quite enjoy it. But I spoke to someone recently and they told me that they can’t wait to get back

Read More »

Preparing Your Business For The Post-Lockdown

Preparing your technology for the post-lockdown world As lockdown measures are easing in the UK, businesses are preparing to make the move back into the office. We’re taking a look at how your business can prepare its technology for post-lockdown – and whatever might follow. A tale of two attitudes An increasing number of people

Read More »

The Most Common Cyber Security Myths

Busting the top 5 cyber security myths In my capacity as the owner of an IT support and IT security business, I spend a lot of my time talking with owners of small and medium sized businesses. In these conversations I hear a lot of opinions about cyber security and I have discovered over the

Read More »

Should You Backup Office 365?

Are you backing up your Microsoft 365 data? Whenever I mention to people the need to back up their Microsoft 365 data, they always seem confused. I’ve found that many businesses think that moving their data to the Microsoft cloud means that they no longer need to worry about backup. Surely that’s one of the

Read More »

Why Your Emails Are NOT Secure!

Are you sending emails securely? Remember the days before we used email in business? If you cast your mind back a few decades there was a time when people used to write their messages down by hand on paper, put it in an envelope and send it in the post. Fast forward to 2020 and

Read More »

CEO Impersonation Fraud

If you received an email from your manager asking you to pay £10,000 into a bank account urgently, would you do it? You might be surprised to hear that some people do. This type of scam is known as CEO fraud or CEO impersonation and it’s the topic for today’s blog. Spear Phishing We’ve talked

Read More »
Scroll to Top