Ransomware – Locked out of your own sytems?

Imagine this – earlier in the day you were working fine. Now you cannot access the system (your own IT system with all your data). You receive a message – pay this amount of money and we will give you back access to your own data. What do I do? Should I pay? Sadly –…

Business Grade Email Protection – Start your free 30 day full featured trial

In an era in which unsolicited emails account for more than half of global email traffic, and email phishing campaigns are reportedly increasing by 400% a year, implementing an email filtering service is more of a necessity and less of an option for businesses. Although basic filtering services exist on most email platforms, spammers and…

Business communications. Anywhere, anytime, any location

It’s been another challenging year all over the world, but there’s one thing from 2021 we can take with us into the new year. Remote working is here to stay, with distributed teams demonstrating high productivity through the benefit of flexible hours, reduced travel requirements and greater work/life balance. Over this period unified communication has…

Ransomware Trends in 2021 & Predictions for 2022

Ransomware is one of the most dangerous cybersecurity threats facing organisations globally. Attackers focus on any organization of any size, so every business should be aware of ransomware and its potential damage. 2021 saw an all-time high in ransomware attacks. SMBs, schools, global supply chains, healthcare providers, government organisations, and MSPs were among those affected by ransomware attacks.…

Unified Communication (UC)

Communication between a business and its customers is crucial. In the “digital age”, Unified Communication (UC) solutions are one of the fastest rising and most popular tools. More and more businesses are turning to this form of efficient communication. Why? It goes far beyond a simple reason like convenience. A solution like this can redefine how you…

Break-fix or Managed Services?

In today’s constantly shifting technological landscape, where fresh viruses and the new security patches designed to protect against them arrive by the week, it takes a proactive approach to stay abreast of all the changes. This is why, more small to midsize businesses (SMBs) are ditching their outdated break-fix strategies and making the switch to…

Don’t ever let your IT company do this to your computer network

Today, when companies need to be lean, nimble and brutally efficient to survive in a competitive marketplace, cutting unnecessary costs is paramount. Unfortunately, it can be easy when you’re on a tight budget to accidentally strip away components of your business that may seem unnecessary but are actually essential to your success. One of the…

3 IT investments you should always take seriously

What is standing between your business’s data and hackers a world away? What’s your plan when your on-site server fails? When you skimp on technology and IT solutions for your business, the answers to these two questions become simple: 1. There is nothing standing between your business’s sensitive data and people who want to take…

3 critical errors you’re making by hiring the cheapest computer support company

In preparation for the New Year, business owners across the country are taking a close look at their finances, scratching their heads as they inspect their budgets, line by line, to cut everything that isn’t absolutely necessary and searching for new investments that will boost their bottom line. In the midst of all this, it’s…

Making this one mistake with your network could destroy your business

A lot of businesses wait until something breaks before they fix it. And even then, they may take a “patchwork” approach to fixing the problem. They are reactive rather than proactive. Sometimes taking a reactive approach is fine, but other times, and depending on the circumstances, it can lead to even bigger problems. When it…

3 critical cyber security protections EVERY business must have in place

Five years ago, you might have had state-of-the-art security protecting your business and network. You had the latest malware protection, highly rated firewalls and a great data backup plan. Maybe you even had a handbook on how to address cyberthreats. You were set. But then you forgot to do one crucial thing: you didn’t stay…

The BIG mistake companies make with their IT Security

If you’re like many businesses today, there’s a good chance you’ve made this one mistake with your IT security: you don’t budget for it. Or if you do budget for it, it’s not enough to really protect your business. Time and time again, business owners decide NOT to invest in IT services. Instead, they go it alone…

Mutifactor Authentication

We understand how important IT security is. At work all our computers are up to date with operating systems and patches. If a stage 4 lockdown occurs, it means my staff have to work from home. Staff are now using their home computers to login and access our systems. I know this comes with risk.…

Last line of defence

We set up our backup years ago. We’re covered. I hear this sort of thing from so many businesses. Unfortunately, backup isn’t the type of thing you can just set and forget about. If your company finds itself compromised by a serious event like cyber-attack or an employee makes an innocent mistake, often your backup…

Virus Attacks

We have a Firewall and antivirus so we are safe. We’re covered.  I often hear this response. And to be fair, this is a good start. In fact, we had a similar line of thinking before we were brought in to diagnose what had happened to a company who was hit by a serious virus…

Firewalls – is yours up to scratch?

We’re protected. We set up a firewall a few years ago. I hear this sort of thing from so many businesses. Unfortunately, cybersecurity isn’t the type of thing you can just set up and forget about. On top of that not all Firewalls are equal. Viruses, malware, and hackers are constantly evolving which means your…

You’ve just experienced a cyberattack. What do you do?

When I speak with small businesses about cyberattacks, it’s surprising how most of them don’t have a plan if they get hit. Where do you store your data backups? How will you continue to operate if you lose your data? These are the types of questions you need to ask yourself in order to properly…

Hackers – how and why?

HOW do hackers steal your data? WHY do they do it? Nearly every business I talk to is worried about cyberattacks. Two of the most common questions I hear are “How do hackers attack?” and “What’s their motivation?” When it comes to hackers, there are three common strategies used: Social engineering. Brute force. Phishing emails.…

The risk around emails

We have our email in 365 so we are safe. We’re covered. I often hear this response. Unfortunately, just because your email sits in Microsoft cloud (or anyone ones cloud) does not automatically mean all is OK. Majority of the time the vendor is responsible for the uptime and availability of their service however it’s…