Working at an external IT Support company, we very often receive forwarded suspicious emails from our clients (this is one reason to whitelist your clients, so it doesn’t get blocked by your spam filter). However, even people with very good common sense can still fall prey. In the following example, you can see that my … read the full article.
1. Think about which devices you need to protect. What and where are these devices? How many of each kind? For example, 8 laptops, 5 desktop computers, 2 servers. 2. How much data is on these computers? 3. Where would you like to store your data – locally, in the cloud, remote location or maybe … read the full article.
Many schools have an internal IT team – it’s hard not to, with printers, projectors and smart boards going wrong every day. But are you certain that your IT team is doing everything in their power to keep your organisation secure, not only from external threats, but internal threats too? What makes schools particularly vulnerable … read the full article.
You might have the best product in the world, but if your customers don’t love you too, it’s pointless. Customer satisfaction can be tricky to get right, but these five tips will get you heading in the right direction: 1) Gather information I know, I know…surveying is a drag. But there are lots of … read the full article.
How to avoid corporate swindlers in Cambridge From property prices to car park charges, Cambridge is among one of the most expensive cities in the UK. We all know that. Don’t get me wrong, it is a great joy and massive opportunity to live and work in such a prosperous city… But running a … read the full article.
It’s standing in the kitchen right now, making a coffee. Cyber criminals will try all sorts of ways to hack into your system, but they can only succeed if someone lets them in. 75% of data loss is caused by user error, so to avoid becoming another statistic it’s essential that everyone in your team … read the full article.