You’ve checked your pockets, your bag, under cushions… and then it hits you. You left your work phone on the table at the coffee shop. You...
Read more
You’re no stranger to the endless threats lurking in your email inbox. But have you ever considered that an email which seems to be from...
Read more
In the fast evolving world of technology, business owners and managers like you are always on the lookout for the next big thing to give them a...
Read more
Are you aware that the rise in global VPN usage has skyrocketed? The reasons are clear as day: Virtual Private Networks offer increased security,...
Read more
It’ll come as no surprise, but Microsoft has yet more exciting news for us. Sometimes we wonder if they allow their employees to sleep! This...
Read more
In our last piece, we looked at some of the features of Microsoft Teams which work together as an interoperable whole that streamlines productivity...
Read more
You may think that cyber attacks only happen to large corporations. But unfortunately, that’s not the case. According to a recent report,...
Read more
Have you heard the saying, “A picture is worth a thousand words”? It seems cyber criminals have too, and they’re using it to their...
Read more
Don’t be mistaken, we love Microsoft Edge (and think you will too), but lately, something has come to our attention that we wanted to...
Read more
Browsing the web can be risky. It only takes one click on one bad link to put your business’s data at risk. With cyber criminals constantly...
Read more
Since its release in 2017 and especially after Covid-19 circulated across the world, the Microsoft Teams platform has proven to be a game-changer in...
Read more
Are you tired of wasting precious time in meetings, only to leave feeling confused and disorganised? Do you struggle to keep track of all the...
Read more
Introduced in 2014, Cyber Essentials is a government-backed scheme that was created to help businesses to protect themselves from common cyber...
Read more
In this the second of our three-part blog series, we will go into detail about the first three of the five Cyber Essential controls. We will also...
Read more
How many times a day do you respond to an email without really thinking about its contents? Maybe it’s a request for some information....
Read more
When you replace old computers or external drives, do you delete data and then just… get rid of them? You could be putting your sensitive...
Read more
Have you ever felt frustrated by the flood of notifications from your multi-factor authentication (MFA) app? Well, cyber criminals have too....
Read moreWe won’t fill your inbox with spam – but we will send out a short newsletter once a month (or less) with news and updates.
Whether you need IT support for small businesses or a school, we’re here to help.