Solutions IT News

Industry insights and news from the world of IT 

Help Prevent a Cyber Attack during the COVID-19 Crisis

COVID-19 has seen many businesses continue working from home, or from an office with a reduced team. Although it's great to see many businesses adapt quickly to these new circumstances and working environments, the COVID-19 crisis has opened up a whole host of...

Microsoft Teams – Meet the hub for teamwork

Have you been looking for a digital space that you can share with your employees & clients to collaborate as one big team to reduce unnecessary emails & meetings? Microsoft Teams is a central hub for all business activities including; meetings, calling,...

What is Microsoft Office 365 ‘MyAnalytics’?

Microsoft Office 365 have released a new AI powered productivity insights feature called ‘MyAnalytics’. It presents you with information & analytical data which can help you to improve your work patterns. The program offers: • Statistics about how you have...

Why should you be using Two Factor Authentication?

Passwords have started to get weaker as a form of security. In the current climate of cyber awareness, there are more attacks and breaches than ever, making it even more important to use a good password. We covered good password measures in a previous blog post...

Cyber Aware Top Tip #6 – Voice Phishing

What is voice phishing (vishing)? It’s very similar to email phishing, except this scam takes place over the phone. Voice phishing is the most human of social engineering scams, making it all more believable. Have you seen the advert by Barclays? This is a perfect...

Why are Cyber Attacks on Universities on the Rise?

Academic institutions are becoming a large target for cyber-attacks. Due to the sheer size of universities, the damage done by cyber criminals can be vast. Not only can it damage reputation, it can have major financial repercussions both instant (breach of regula...

Cyber Aware Top Tip #5 – Shoulder Surfers

What is Shoulder Surfing? Sometimes known as tailgating, shoulder surfing is the practice of spying on a user of an electronic device in order to obtain their data or passwords etc. This can be both an online and offline activity, so it’s important to be vigilant...

Cyber Aware Top Tip #4 – Removeable Media

Although cloud storage is a popular method of holding data, there are still physical products which are used by many people to store and transfer their information. Items like USB sticks, SD cards & external hard drives are good examples of portable devices and...

Cyber Aware Top Tip #3 – Strong Passwords

Weak passwords are easy for hackers to crack. Security experts say that you should use strong & unique passwords for each of your accounts online. Most people tend to choose a complex password and use it across all of their platforms, however this can leave all...

Cyber Aware Top Tip #2 – Leaving Your Desk

Do you find yourself leaving your desk frequently within your workplace? When leaving your desk for any reason, you should make sure that your data is secure to avoid undesirables accessing your clients important information when you aren’t around. Don’t leave...

cloud services

Increase efficiency and reduce environmental footprint through optimised printing devices

it support

Avoid making the wrong IT decisions with assistance from our tech experts.

cyber security

Protect your company from cybercriminals using our multifaceted approach.

voip

Improve communications with our feature-rich internet-based telephone systems.