UK Storage of Office 365 data
Understanding where your data is stored is important and you can now find out which datacentre in the UK your Office 365 data is stored. Read the blog to find poout more
Understanding where your data is stored is important and you can now find out which datacentre in the UK your Office 365 data is stored. Read the blog to find poout more
This article goes through the main points raised at a recent seminar we ran “GDPR & what it means for your business”. What steps should you and your organisation be taking to become GDPR compliant.
This blog discusses encryption, why it’s important and where you can access free encryption tools
This blog discusses two factor authentication, why it’s useful and how to set it up
Are you looking to improve cyber security in your business? Have you considered Cyber Essentials certification? This blogs discusses the benefit of Cyber Essentials to any size business
Cyber Essentials represents good security practice for firms of all sizes in the UK. Very small and micro businesses with a very small number of
We had an excellent panel of speakers at our recent Cyber Crime Seminar. Read here to find out the highlights
What does end of support mean for Office 2007 and why should you upgrade your software? What options do you have? Read more to find out why and how you should upgrade
In this article we talk about the different types of common email scams, and what to do if you think you’ve received one.
In this second blog from the series “Protecting against Cyber Attacks” we cover some more technical steps to help protect your organsiation.
The NHS cyber attack, in May 2017, affected more than 200000 computers and 100 countreis. What learnings can we take from it to prevent a cyber attack happening to our organisation
This article discusses why your business should have an IT focused Business Continuity Plan and what should be in it.
In the first part of our series “Protecting against Cyber Crime” we talk about the threat to UK businesses, common types of cyber attacks, and what precautions you can take to help protect yourself.
With most systems requiring a password to log in, what does a good password look like, and how do you practically remember them all? Read this blog to find out.
We help you to understand and use IT – to make your business, your job and your life better
Just complete this form and a member of our team will contact you to arrange: