Due to Coronavirus many of us don’t have a choice about going to our offices at present, but after we come through this, you may be offered choices to be more flexible in where you work. Think very carefully about your decision… Option 1: So you are lucky enough to have your own home office … read the full article.
I think everyone would agree, working from home instead of the office definitely has its benefits. You can look at what you want on the web, play a few computer games on the side, do some online shopping, all slotted in around your working day of course and who is to ever know? No having … read the full article.
Ubuntu is a free and open-source Linux distribution based on Debian. Ubuntu is officially released in three editions: Desktop, Server, and Core. All the editions can run on the computer alone, or in a virtual machine. Ubuntu is a popular operating system for cloud computing, with support for OpenStack. Named after an African philosophy of … read the full article.
Trac is an open-source, Web-based project management and bug tracking system. It has been adopted by a variety of organizations for use as a bug tracking system for both free and open-source software and proprietary projects and products. Trac integrates with major version control systems including Subversion and Git.
Passwords, passwords and more passwords, we need them for everything it would seem so dont fall into the trap of using the same one! Keep them safe and use this free open source software. KeePass Password Safe is a free and open-source password manager primarily for Windows. It officially supports macOS and Linux operating systems … read the full article.
#brexit We have another delay. Don’t delay your backups. I am sure you have all taken many steps to be as ready as you possibly can be while we sit in limbo waiting for an outcome. Have you considered how your data may be affected too? Talk to us to ensure your data will be … read the full article.
Working at an external IT Support company, we very often receive forwarded suspicious emails from our clients (this is one reason to whitelist your clients, so it doesn’t get blocked by your spam filter). However, even people with very good common sense can still fall prey. In the following example, you can see that my … read the full article.
1. Think about which devices you need to protect. What and where are these devices? How many of each kind? For example, 8 laptops, 5 desktop computers, 2 servers. 2. How much data is on these computers? 3. Where would you like to store your data – locally, in the cloud, remote location or maybe … read the full article.
Many schools have an internal IT team – it’s hard not to, with printers, projectors and smart boards going wrong every day. But are you certain that your IT team is doing everything in their power to keep your organisation secure, not only from external threats, but internal threats too? What makes schools particularly vulnerable … read the full article.
contact us now