Are employees undermining your security?

Are employees undermining your security?

Are your employees compromising your security without even realising? Commonly, 3-6% of employees will use weak passwords and even share those passwords between accounts. These kinds of insecure password practices result in leaked passwords, which are exploited in 81%...
Ready for VoIP?

Ready for VoIP?

What is VoIP? Voice Over Internet Protocol (VoIP) can also be referred to as IP telephony, Internet telephony, Hosted telephony or cloud-based telephony. In simple terms, it is a phone that sends and receives calls over an internet connection rather that a traditional...
EPoS – Ready for Re-opening?

EPoS – Ready for Re-opening?

With the news that non-essential shops have been given the green light by the government to open from June 15th, it is important for retailers to start considering their EPoS and electronic payment devices. 4s Systems want to help you so we have put together our guide...
Office 365 Backup

Office 365 Backup

Why do I need to back up my Office 365 data? Microsoft only replicates your Office 365 data within their data centres and will only keep messages in the deleted items folder for up to 30 days by default. Should you accidentally delete a message from this folder, or if...
Securing the Remote Worker

Securing the Remote Worker

As we continue to see a significant increase in companies advising employees to work from home due to the coronavirus (COVID-19) outbreak, I wanted to reach out with important steps you can take to provide secure remote work access to your staff. Even if you are...