Latest Blogs

Key Differences between ADSL, Fibre Optic and Cable Broadband

Key Differences between ADSL, Fibre Optic and Cable Broadband

The terms ADSL, Fibre Optic and Cable Broadband have a number of key differences between them. All three options use a high-speed Internet connection known as Broadband. However, the technology that they each option uses to deliver this high-speed Internet connection...

Remote working from home

Remote working from home

Working remotely from home means that you will have to set up an office at home. Certain steps will need to be taken to ensure you create a home office that makes remote working a success. Create space for a home office Creating a home office should include a separate...

Working with Outdated Technology

Working with Outdated Technology

In the extraordinary times that we are all living in, it may not seem wise to invest in new technology and systems. But what is the real cost to your business by not technologically moving forward? Most of us have experienced working with outdated technology and...

Who remembers the 90’s?

Who remembers the 90’s?

1992 - who could forget, but wishes they could, the fashion sense? The florescent socks, the oversized baseball jackets and the baggy jeans. 1992 was filled with numerous events, who remembers these: Ford unveiled the Mondeo to take over from its flagship model the...

Common Problems with traditional Endpoint Protection Solutions

Common Problems with traditional Endpoint Protection Solutions

State-of-the-art cyberattacks are designed to attack the protection provided by traditional security solutions. These types of attacks are becoming more sophisticated and more frequent as hackers become more professional. Mainly, it is because companies are not...

Are employees undermining your security?

Are employees undermining your security?

Are your employees compromising your security without even realising? Commonly, 3-6% of employees will use weak passwords and even share those passwords between accounts. These kinds of insecure password practices result in leaked passwords, which are exploited in 81%...

Ready for VoIP?

Ready for VoIP?

What is VoIP? Voice Over Internet Protocol (VoIP) can also be referred to as IP telephony, Internet telephony, Hosted telephony or cloud-based telephony. In simple terms, it is a phone that sends and receives calls over an internet connection rather that a traditional...

EPoS – Ready for Re-opening?

EPoS – Ready for Re-opening?

With the news that non-essential shops have been given the green light by the government to open from June 15th, it is important for retailers to start considering their EPoS and electronic payment devices. 4s Systems want to help you so we have put together our guide...

Office 365 Backup

Office 365 Backup

Why do I need to back up my Office 365 data? Microsoft only replicates your Office 365 data within their data centres and will only keep messages in the deleted items folder for up to 30 days by default. Should you accidentally delete a message from this folder, or if...

Securing the Remote Worker

Securing the Remote Worker

As we continue to see a significant increase in companies advising employees to work from home due to the coronavirus (COVID-19) outbreak, I wanted to reach out with important steps you can take to provide secure remote work access to your staff. Even if you are...