Well this is awkward…. reduce printing wastage

We’re under no illusions – nobody wants a conversation about printers. Maybe that’s why so many SMBs in the UK (52%, according to some surveys) are turning a blind eye to the cost of their printing. Because if they knew what they were spending (£10,000-a-year-plus in many cases) they most likely wouldn’t be able to…

Backup vs archiving: when, why and how

There is often confusion between the two complementary processes of data backup and information archiving. In this article, we compare them and discuss the specific needs addressed by each one. We also review why organisations continue to need both a backup and an archiving solution even after they have moved to Microsoft Office 365. Comparing…

How to improve user productivity – without a theory lesson

A core objective of every business is to ensure that revenue consistently outpaces costs. Technology plays a huge role in achieving that goal. Interruptions—whether hardware or software failure, user fatigue, or vexing collaboration issues—are significant inhibitors of productivity that employers must keep to a minimum to prevent adverse impacts on revenue. Demystify the productivity problem…

The evolution of spear phishing – is your business prepared?

Why is phishing spelt with a ph? What makes spear phishing different? Who’s a potential target? Spear phishing is a huge concern to organisations around the world. It’s therefore crucial to understand that the evolution of spear phishing, key targets, and best practices to prevent these pervasive attacks. Many people think that spear phishing is just…

Guaranteed peace of mind with email security

The bad news? A single security strategy won’t protect your business while threats are evolving, improving, and growing in sophistication. But the good news is that there are solutions. The polymorphic nature of modern cyber threats renders traditional signature-based defence mechanisms inadequate. On the other hand, in-depth defence techniques like sandboxing are expensive and come…

Know your IT security threats

Secure inboxes aren’t enough. Anti-malware software isn’t enough. Fraud detection isn’t enough. Physical backup isn’t enough. Can a business IT security strategy ever be enough to counter modern cyber security threats? Some of the challenge is because 91% of hacks start with a targeted email attack, and 80% of security-related breaches are caused by employee…

Your business email is vulnerable – change that with a FREE scan

According to the UK’s National Cyber Security Centre, “phishing attacks are one of the most prolific and effective forms of cyber attacks as criminals exploit data breaches, current affairs, seasonal events and social media to craft seemingly personal and legitimate emails.” The Centre also advises that “data breaches are a recurrent theme in cyber security…

Make sure your emails don’t let you down

With cybercrime on the rise and more and more employees and contractors working “on the go”, it’s more important than ever to have the right email security in place for your business. From your inbox to your employees, you need to know that every avenue a hacker could take is blocked. But with increasingly sophisticated…

Some Christmas crackers – of the IT variety

It’s the season for it, and to celebrate the (almost) last working day before the big 2-5, we’ve joined many TV channels in producing our very own top-10 countdown. Based on some of the TV offerings we’ve seen, we could have chosen to count down anything from our top-10 favourite Christmas puddings through to our…