EDR – the modern AntiVirus! Do you have it in place?

In a continuation of our series of Security posts, this week we are focusing on EDR – Endpoint Detection and Response. The first question you are probably asking. What is EDR? Endpoint Detection and Response (EDR) is a new form of cyber security technology that helps continuously monitor, prevent, detect, and respond to ever-changing cyber threats and recover quickly when ransomware or other…

Read more »

Phishing scams – don’t take the bait

Continuing our series of posts aligned to Cyber Awareness month, this week we are highlighting an increasingly common threat – Phishing Scams. Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request…

Read more »

Windows 7 End of Life – 5 Key Questions Answered

Microsoft will terminate support for Windows 7 on 14th January 2020. Windows 7 is currently in a phase Microsoft describes as “extended support” but by 14th January 2020 all support ends and no further security updates will be issued. In this blog we have provided answers to some of the most common questions regarding “end…

Read more »

Today is Safer Internet Day

Did you know that 50% of small businesses have experienced a data breach within the last 12 months? And ‘Internal Vulnerabilities’ are responsible for 70% of those data breaches!!! You’re probably asking “what the heck does that mean to me?”. In simple terms there is a 1 in 2 chance you will face some sort of compromise to your…

Read more »

How a good ‘Technology Partner’ can change your business

Every business, small or large, has 3 basic levels of technology support needs. 1. Make sure it works – Every organisation, from a major corporate down to a not-for-profit, needs IT staff who are able to offer routine maintenance and support, including the updating of hardware and software, handling maintenance, and putting out daily fires. 2. Make sure it works when needed…

Read more »

6 Steps to Keeping Your Data Safe

Much like biological viruses, there are many ransomware threats circulating the web. Some are well known, while some are new and others are not yet known or developed.  With every occurrence, the sophistication of these viruses is increasing in a multitude of ways, including how they spread and how they encrypt data. As your IT service provider,…

Read more »

7 Cool NEW Features in Office 365

1. Working anywhere from any device You get the Office Web Apps with your Office 365 subscription, so you can work on your cloud files from any up-to-date Web browser on an Internet-connected computer. You don’t have to install the Office software on the computer. You also get access to Office Mobile Apps so you…

Read more »