Latest Blogs

Cyber Security Tips to Minimise a Cyber Attack

Cyber Security Tips to Minimise a Cyber Attack

A Cyber attack is usually achieved when cyber criminal groups are able to install malicious software onto someone’s computer without their knowledge and gain access to their personal information. This malicious software is known as malware and can include viruses and...

Disadvantages of Home Working for Employers

Disadvantages of Home Working for Employers

Many employers have had to introduce home working. Although beneficial, there are also a number of disadvantages for employers. These will need to be taken into account when planning for a remote team working from home. Increased Micro Managing One of the...

Advantages of Working from Home

Advantages of Working from Home

Working from home has many advantages and is a useful means to fulfil your work obligations without having to commute to your place of work. This is especially important with the recent increase in lockdown rules and Covid-19 cases. Flexible working As working from...

Key Differences between ADSL, Fibre Optic and Cable Broadband

Key Differences between ADSL, Fibre Optic and Cable Broadband

The terms ADSL, Fibre Optic and Cable Broadband have a number of key differences between them. All three options use a high-speed Internet connection known as Broadband. However, the technology that they each option uses to deliver this high-speed Internet connection...

Remote working from home

Remote working from home

Working remotely from home means that you will have to set up an office at home. Certain steps will need to be taken to ensure you create a home office that makes remote working a success. Create space for a home office Creating a home office should include a separate...

Working with Outdated Technology

Working with Outdated Technology

In the extraordinary times that we are all living in, it may not seem wise to invest in new technology and systems. But what is the real cost to your business by not technologically moving forward? Most of us have experienced working with outdated technology and...

Who remembers the 90’s?

Who remembers the 90’s?

1992 - who could forget, but wishes they could, the fashion sense? The florescent socks, the oversized baseball jackets and the baggy jeans. 1992 was filled with numerous events, who remembers these: Ford unveiled the Mondeo to take over from its flagship model the...

Common Problems with traditional Endpoint Protection Solutions

Common Problems with traditional Endpoint Protection Solutions

State-of-the-art cyberattacks are designed to attack the protection provided by traditional security solutions. These types of attacks are becoming more sophisticated and more frequent as hackers become more professional. Mainly, it is because companies are not...

Are employees undermining your security?

Are employees undermining your security?

Are your employees compromising your security without even realising? Commonly, 3-6% of employees will use weak passwords and even share those passwords between accounts. These kinds of insecure password practices result in leaked passwords, which are exploited in 81%...

Ready for VoIP?

Ready for VoIP?

What is VoIP? Voice Over Internet Protocol (VoIP) can also be referred to as IP telephony, Internet telephony, Hosted telephony or cloud-based telephony. In simple terms, it is a phone that sends and receives calls over an internet connection rather that a traditional...