Blogs

Browse through our most recent articles to gain expert advice and recommendations for great hardware and software

[EBOOK] 11 scary signs your business has been hacked

Has your business been hacked? We all get frustrated with slow laptops, or when computers start doing strange things. But here’s another way to look at it… What if your laptop is being slow… just because it’s been hacked? And in the background it’s doing lots of things for the hackers (which is why it […]

Read more

[EBOOK] Would your business pass the Data Security challenge?

Would your business pass the 57 minute data security challenge? Here’s a bold challenge for you. I’m confident that if I were to visit your business today, I’d find a weakness in your IT system within just 57 minutes. I call this our 57 minute Data Security Challenge.

Read more

[EBOOK] 5 Clever Ways to use O365

Bet you didn’t know you could do that in Office 365? What? Loads of stuff. Microsoft Office 365 has all sorts of wonderful features. And I’m willing to bet there are loads of them you don’t even know about. Which could work wonders for your team’s productivity levels.

Read more

[EBOOK] GDPR

Would your business pass the 3 beers test? It’s a Thursday evening. You’ve travelled to meet some contacts, and had a great day. The meeting is very productive, and turns into 3 beers and a meal. Great fun and the night quickly slips away from you.

Read more

[EBOOK] Are you using Whatsapp to discuss business?

WhatsApp is not a secure way to run your business. Here’s a better way Do your staff use WhatsApp, to discuss company business? That might seem secure, but it means you’re not really in control of what data is where. How do you wipe company data from someone’s WhatsApp when they leave the business? There […]

Read more

[EBOOK] Malware in the Cloud

Cloud computing is great. But nowhere near as safe as you thought… Cloud computing is amazing, isn’t it? Where you can use software through your browser rather than having to download something. And access any data anywhere, on any device. You might think that it’s really safe.

Read more

[EBOOK] Phishing…Don’t be easy bait!

It takes just one click on a dodgy email, and the hackers are inside your business Scary thing is, they’re targeting the smartest people (including you) You’ve probably heard of phishing attacks. But do you know what phishing actually means? At its simplest, it’s a hacker sending you an email, pretending to be someone else.

Read more

[EBOOK] 21 ways to help your staff get more done in less time

21 ways to help your staff get more done, in less time – with Office 365 They say time is money, and anyone who’s serious about Getting Things Done knows all about the importance of time management. Most of us find ourselves struggling to keep up with our to-do lists, especially in this digital age […]

Read more

Why 2 Factor Authentication is important

In the world of online business, keeping customers happy is the most important factor of all. While products and services need to be tailored with this sentiment in mind, you must not overlook the basic client needs. The concept of safety and security is their number one demand, which is why the right protocols must […]

Read more

Could Dual Monitors improve your productivity?

In a regular workplace environment, it isn’t unusual to see certain workers with two, three, even four screens. Does it make sense for the regular computer user or even employee to have more than one? Let’s take a look at the pros and cons so you can decide if having a dual monitor setup could […]

Read more