Insights and Updates

topics of interest delivered fast & to the point ...

IT Insights

Where does junk email originate from?

Where does junk email originate from?

Spam, also known as junk email, is unsolicited messages sent in bulk via email.  Email is considered by some marketeers to be a very cost-effective way of commercial advertising.

Email addresses are sourced to form large distribution lists, these lists are then used to mass broadcast a message.

SharePoint or OneDrive?

SharePoint or OneDrive?

The answer is that SharePoint still does a lot of things OneDrive doesn’t.
OneDrive is an as-is, out-of-the-box service. SharePoint requires some development and customization, but it can do just about anything you may want it to do. Your company may be able to get by with just a OneDrive for Business subscription, but it comes down to what all you need your collaboration platform to do.

IT Budgets & Investment

IT Budgets & Investment

These two approaches to IT investment are referred to as:

Capital Expenditure (CapEx): CapEx is the spending of money on physical infrastructure up front, and then deducting that expense from your tax bill over time. CapEx is an upfront cost, which has a value that reduces over time.

Economies of scale

Economies of scale

Economies of scale is the ability to do things more efficiently or at a lower-cost per unit when operating at a larger scale. This cost advantage is an important benefit in cloud computing.

Cloud providers such as Microsoft, are large global businesses leveraging the benefits of economies of scale, and then pass the savings onto their customers.

Is Cloud Computing Cost Effective?

Is Cloud Computing Cost Effective?

Cloud computing provides a pay-as-you-go or consumption-based pricing model. Rather than paying upfront for a pre-defined amount of computing resources or hardware, you can rent hardware and pay for the resources that you actually use.

This consumption-based model brings with it many benefits, including:

No upfront costs.

What makes hypervisors weak?

What makes hypervisors weak?

Hypervisors have changed the game of cybersecurity. They provide unmatched cyber protection for your data as they keep it in the cloud. However, hypervisors still have vulnerabilities that hackers can exploit. Find out how their weak points can be addressed.

ISO 27001 Awarded to Solutions4IT Ltd

ISO 27001 Awarded to Solutions4IT Ltd

Solutions4IT Limited are pleased to announce the award of ISO 27001, a very big well done to the Directors and all Staff who have worked hard to achieve the standards required. The award demonstrates a high level of competence in the area of information security.

The Mail Laundry

The Mail Laundry

Spam / junk mail is a nuisance, it builds up to vast amounts of unwanted emails, which saturate your inbox, and demand your constant attention. Worse still junk mail contains viruses and malicious code that create havoc when active on your devices and can spread at speed throughout your workplace.

Understanding the Cyber Security Threat

Understanding the Cyber Security Threat

Solution4IT Cyber-Security Blog Series

Feb – May 2019

A series of 14 weekly blogs detailing good practice when protecting against IT security threats.

Week1 – Intro....

More than ½ the worlds population now use the Internet, and it is predicted that the number of connected devices will reach a staggering 125 billion within the next 10 years.

The 2019 Solutions4IT Challenge

The 2019 Solutions4IT Challenge

OMG, Phil, you sure we can do this?

In just a few short months team Solutions 4 IT will be taking on the task of climbing ‘Snowdon’ motivated by the opportunity of raising money for a cause close to all our hearts.

New Year and a new challenge started with a ‘gentle’ training regime suited to all but a few!! you know who you are !! still time to catch up !! The feeling is that Phil – who has organised the challenge, will now start putting us through our paces and making sure the whole team are on top form come the day of this epic occasion.