020 3151 6000

Innovation and Security: The Key IT Themes in 2017

Posted by

2016 has been a bumper year for IT innovation, and we anticipate the pace of change to continue at full throttle. Here are our predictions for 2017: • The continued shift to cloud computing • The Internet of Things becoming far more mainstream • Hot Desking and new ways of working • Office Automation • […]

Outlook 2016: Can you view ‘too much’ with conversation setting?

Posted by

So far I have been very impressed with Outlook 2016, the latest edition from Microsoft.  However, I have found a feature which is very subtle, but one that I could see causing some major problems in the work place. The feature is part of the “Show as Conversations” setting which groups all emails together that are […]

Corporate Web Proxy, more than just a porn filter!

Posted by
Back in the late 90’s when the Internet was just starting out companies began introducing Web Proxies or filters.  The purpose of these was to ensure that the small amount of bandwidth (yes 1Mbps was fast then!) was utilised purely for business purposes.  This meant no Facebook, music downloads, games or other non-related business activities. [...]

Email Encryption

Posted by

Our MD, Jon Abbott, has been researching the different email encryption solutions available on the market. The two that really caught his eye are Proton Mail and Cirius. Proton Mail The first is a fully functional, highly secure email platform that is hosted in a Data Centre 1,000 metres below the Swiss mountains.  The only downside […]

Backup vs Archive

Posted by

Backup vs Archive – an important differentiation most people don’t make The easiest way to choose between backup and archiving is to consider what data you’re storing and for what duration. Backup should be used for the rapid recovery of operational data. Backups are there to provide a fast method for recovering data that is current […]

Backup risk assessment, what are the options?

Posted by

Background It’s highly likely that your company’s data is subject to the following risks: Hardware failure Software fault User error Ransomware If you are affected by any of the above, there’s a high chance that you are going to need to restore your data from backup.  For points 1-3 any backup is fine, whether that […]

The accelerating growth of ransomware

Posted by

What is ransomware? As the name suggests ‘ransomware’ is a malicious software that denies a user(s) access to data stored on a Local PC, Server and now mobile devices, this data will be held to ransom until a fee has been paid. Types of ransomware Encryptor Ransomware – Files will be deleted once they are encrypted, generally […]

Backing up your website – manual versus cloud

Posted by

Backing up your website – manual versus cloud In my previous article I discussed why you should back up your website. Now I’m going to look at a few of the ways you can do this, as well as any downsides to the method chosen. Manual options File Transfer Protocol (FTP) One option for a […]

Lock Your Computer – It’s Simple IT Security

Posted by

We are proud to be a company that implements an Information Security Management System compliant with ISO 27001:2013. As a result we have many policies and procedures in place to increase the security of our environment, and advise our clients to follow the same best practice. It can be difficult to balance system security and system usability, which is why […]

Page 1 of 2 1 2