When Windows 10 cracks

2020-01-14T09:54:12+00:00January 14th, 2020|Categories: IT Support|Tags: , , |

When Windows 10 cracks There are all kinds of ways in which the Windows 10 operating system represents an interesting departure from Microsoft’s past, but perhaps the most obvious is in the upgrade system. While Microsoft’s core base of enterprise users continues to have a significant degree of control over which updates they [...]

Email and GDPR: can you check your employees’ emails?

2020-01-14T09:44:33+00:00January 14th, 2020|Categories: Compliance, IT Support|Tags: , , , , |

Email and GDPR: can you check your employees’ emails? End users (in this case employees) and IT departments often see corporate email as being one of their major professional challenges, albeit for very different reasons. To end-users, the volume of email processed each and every day is often a time sink that can gobble away at their productivity, whereas to IT [...]

Making the most of your content with repurposing

2019-11-14T16:48:56+00:00November 14th, 2019|Categories: IT Support|Tags: , , , |

Making the most of your content with repurposing With many people’s focus turning to reusing and recycling their belongings to save the earth, it’s worth remembering that those philosophies have lots of other applications too, such as managing your content. Given how much time, energy and resources you have no doubt ploughed into creating [...]

Which processes should SMEs be automating?

2019-03-19T15:26:08+00:00March 19th, 2019|Categories: IT Support|Tags: , , , , |

Which processes should SMEs be automating? Automation essentially means delegating tasks to a machine. While there are periodic media articles about the effect of automation on employment, there is also a strong case for arguing that automation, when done correctly, is actually not a threat to SMEs at all. In fact, it’s a huge [...]

Is the Krack attack back?

2019-02-13T12:35:40+00:00February 13th, 2019|Categories: IT Security, IT Support|Tags: , , , , |

Is the Krack attack back? WiFi may be one of the greatest conveniences of the 21st century but, as is often the case, with great convenience comes security implications. The dangers of using public WiFi have long been public knowledge, but there have also been concerns about the danger of the WiFi protocol itself. [...]

The role of the CISO and the challenges it brings

2019-02-13T12:19:12+00:00February 13th, 2019|Categories: Compliance, IT Support|Tags: , , , , |

The role of the CISO and the challenges it brings If there was ever any doubt that the role of Chief Information Security Officer (CISO) was an important one then these questions should have been resolved over recent months. A combination of data-related scandals and the introduction of GDPR should hopefully have convinced [...]

How external IT support can make it easier for SMEs to manage change

2019-01-29T15:09:07+00:00January 29th, 2019|Categories: IT Support|Tags: , , , , |

How external IT support can make it easier for SMEs to manage change When an SME hires an external IT company, they may expect that they will troubleshoot computer crashes and deal with emergencies, but the potential of an external IT company is often underestimated. As well as keeping on top of current [...]

New Year resolutions for the security-conscious small business

2019-01-29T15:03:02+00:00January 29th, 2019|Categories: IT Security, IT Support|Tags: , , , , |

New Year resolutions for the security-conscious small business What would a new year be without a list of suggested resolutions? On top of vowing to go to the gym three times a week and never smoke again, you will want to check out these three resolutions for security-conscious small businesses. They may be more [...]

CISSP: what does it mean for you?

2019-01-29T13:03:36+00:00January 29th, 2019|Categories: IT Security, IT Support|Tags: , , , , , |

CISSP: what does it mean for you? CISSP stands for Certified Information Systems Security Professional. The certification is backed by the International Information System Security Certification Consortium (ISC) ², which will celebrate its 30th anniversary in 2019. In order to obtain the CISSP credential, candidates have to display an appropriate level of knowledge [...]

Disaster recovery and business continuity for small businesses

2018-08-03T14:50:45+00:00August 3rd, 2018|Categories: Compliance, IT Support|Tags: , , , , , |

Disaster recovery and business continuity for small businesses Disaster recovery and business continuity are two sides of the same coin. Disaster recovery gets you up and running again as quickly as possible after disaster strikes, while business continuity allows you to “keep calm and carry on” in a broader sense. It can include plans [...]

Load More Posts