3 Steps to avoid being targeted by phishing scams

Businesses are seeing an increase in the number of malicious emails being received on a daily basis, with it being estimated that nearly half of all emails received are now spam. Email is an effective method of cyber attackers reaching your end users and infecting your network with ransomware. How do phishing scams work? Phishing… Read More

Windows 10 – First look and thoughts

It seems like Microsoft with Windows 10 are finally recognising that desktop computing is still alive and kicking; similarities to the Windows 7 desktop have been resurrected with some great improvements. However users aren’t going to adopt the new operating system just because they’ve brought features back from 10 years ago!! They’re trying to appeal… Read More

Everyone should be using Azure

Cloud computing is becoming the norm in many companies, so this is an ideal time to make you aware of the extensive experience within our team for implementing, migrating and maintaining Microsoft Azure solutions for our customers. Some recent projects we have been involved in:- INTERNET CONSUMER BUSINESS MERGER – PROJECT: AD AND EMAIL CONVERGENCE… Read More

Vendor Audits – Compliance or Revenue?

Ten years ago vendor audits were few and far between, focus being mainly on the large enterprise customers with huge IT teams, purchasing departments and compliancy procedures; but things are changing… Whether it’s the clever license tracking, online registrations or just lower revenues that are pushing vendors in this direction, it’s definitely here to stay… Read More

Four steps to preventing Cyber Security

Four Steps to Preventing Cyber Security Threats in your Manufacturing Business Over the last ten years, Cyber Security threats have increasingly become a major problem for all organisations. Rather worryingly, the manufacturing sector is now reported to one of the most frequently hacked industries, second only to healthcare. i Whilst some businesses plan to make… Read More