Technology Blog


Would your business pass the 3 beers test? It’s a Thursday evening. You’ve travelled to meet some contacts, and had a great day. The meeting is very productive, and turns into 3 beers and a meal. Great fun and the night quickly slips away from you. You rush for a late train home, and on

Read More »

[EBOOK] Are you using Whatsapp to discuss business?

WhatsApp is not a secure way to run your business. Here’s a better way Do your staff use WhatsApp, to discuss company business? That might seem secure, but it means you’re not really in control of what data is where. How do you wipe company data from someone’s WhatsApp when they leave the business? [youtube

Read More »

[EBOOK] Malware in the Cloud

Cloud computing is great. But nowhere near as safe as you thought… Cloud computing is amazing, isn’t it? Where you can use software through your browser rather than having to download something. And access any data anywhere, on any device. You might think that it’s really safe. That the software developers are one step ahead

Read More »

[EBOOK] Phishing…Don’t be easy bait!

It takes just one click on a dodgy email, and the hackers are inside your business Scary thing is, they’re targeting the smartest people (including you) You’ve probably heard of phishing attacks. But do you know what phishing actually means? At its simplest, it’s a hacker sending you an email, pretending to be someone else.

Read More »

[EBOOK] 21 ways to help your staff get more done in less time

21 ways to help your staff get more done, in less time – with Office 365 They say time is money, and anyone who’s serious about Getting Things Done knows all about the importance of time management. Most of us find ourselves struggling to keep up with our to-do lists, especially in this digital age

Read More »

Why 2 Factor Authentication is important

In the world of online business, keeping customers happy is the most important factor of all. While products and services need to be tailored with this sentiment in mind, you must not overlook the basic client needs. The concept of safety and security is their number one demand, which is why the right protocols must

Read More »
Scroll to Top