Blogs
All Blog Posts
Five simple steps for using passwords to protect your data
You want to be able to access your data on all your devices. However, you don’t want others to access it. That’s why password-protecting your laptops, computers, tablets, printers, routers and smartphones is essential.
Keeping your smartphones, tablets & other devices safe
5 quick tips that can help keep your business mobile devices (and the information stored on them) secure.
How to protect your business against malware
Malware protection for your business
In accordance with the National Cyber Security Centre, here are 5 ways you can protect your organisation from malware.
Five things to consider when backing up your company data
Businesses handle an array of data on a daily basis, from the everyday quotes and orders to the more sensitive customer and payment details.
Backing up this data is critical
How to change view on outlook
Outlook comes with three view types by default – Compact, Single and Preview. Here is your free guide on how to change view on Outlook. The option to change the view can be selected by clicking on View button on the top bar of your Outlook application. By clicking on...
Review your cyber security
Why a regular review of your cyber security protection is a good idea for your business. Can you afford to be complacent when it comes to security? Not when over half of all cyber-attacks are occurring against small businesses. Due to the war in Ukraine, and with more...
Phishing – are your staff the weakest link?
Here is your free guide on how to spot scam phishing emails. Unfortunately, it doesn’t matter how much security software you add to your hardware if you don’t protect your emails and train your staff to recognise and avoid hackers. Okay, so that might sound a bit...
Guide to SIP Trunks for Business
Here is your guide to SIP trunks for business. Session Initiation Protocol (or SIP) trunks are an ideal go-between for bridging the gap between traditional phone systems and internet-based (VoIP) ones. You might be used to traditional ISDN phone lines, so why change?...
What is Smishing?
Most of us have been targeted by fraudsters using a technique called Smishing. You may not have even been aware of it. But what is Smishing? Smishing is when fraudsters use SMS phone messaging to impersonate a trusted organisation in an attempt to steal your personal...