logo

Select Sidearea

Populate the sidearea with useful widgets. It’s simple to add images, categories, latest post, social media icon links, tag clouds, and more.
[email protected]
+1234567890

Support: 0208 1668 716 | Sales: 0330 1224 420

Follow Us:

Recent Comments

    December 2021

    Defend and Invest Cover

    Did you get a short break at Christmas? Even if it was just a few days, that break can give you huge clarity of thinking about where to take your business this year.   We call this the January Refresh & Refocus.   Let us tell you the two technology areas that will be the most important in 2022. They are Defend and Invest.   Defend is about protecting your business...

    Read More
    Log4j Vulnerability

    Apache Log4j is a logging tool written in Java. It's part of the Apache Software Foundation's Apache Logging Services project. One of the numerous Java logging frameworks is Log4j.   The Apache Log4j team created Log4j 2 in response to concerns with Log4j 1.2, 1.3, java.util.logging, and Logback, and to address issues with those frameworks. Furthermore, Log4j 2 had a plugin architecture, making it more extensible than...

    Read More
    Man standing at a bank counter and searching for his password on a long document.

    When going about your day, there seems to constantly be a service asking for a password, it feels as if you need one just to change your mind these days.   How many passwords do you think you have? How do you remember them all? Or do you just use the same one over and over?   Just think for a minute of your front door key, how many...

    Read More
    An online shopper falls for a scam.

    The global pandemic of COVID-19 caused many shops to close and forced people to stay at home more than ever, socialising over Zoom and shopping online. In recent years, there has been an explosion in the growth of internet retailing, with more than half of all UK consumers now shopping online according to retail analysts, GlobalData.   With the UK's online shopping spend forecast to grow 30%...

    Read More
    A person discovering that the cloud are a bunch of servers linked to the computer at home

    First things first: when we want to talk about 'the cloud', we need a bit of vocabulary - a bit like the Spanish or French classes back in school. Let's start with server. Very simplified, a server is a powerful computer that provides one specific job to other computers. Data centres are centres that host a lot of data on said servers.   With those two things...

    Read More
    Ransomware attack with two people at their desks

    When a new user account is created, the type of account determines what the user is able to do. This article outlines access control basics and helps you to navigate through the different aspects of identity management.   User Types   An administrator is someone who is in charge of the settings and controls of a computer, and someone logged into an account with administrator privileges can do pretty...

    Read More
    Cyber Crime - A computer stealing from you

    Learning how to avoid being a victim of crime is an important life skill. At school, you learn to lock your locker securely and not allow other people to see what the combination numbers are. You would not leave an expensive or favourite coat hanging up unwatched in the cloakroom and you would not broadcast how much money you were carrying in your pocket.   As you...

    Read More
    Router Ninja standing by the door

    Throughout history, when building homes, villages and towns, people have sought to create a layer of defence or security to maintain their safety and keep the bad guys out. Means of doing this have included locating oneself on a high hill, building boundary walls, moats, strong front doors and deploying armed guards and dogs.   In the cyber world, rather than your material possessions, the commodity here...

    Read More
    What are the differences between Microsoft 365 Business Premium and Office 365 E3?

    In today's competitive industry landscape, it is more important than ever to get the best value for money that is available to you and your business.   Nonetheless, defending against cyber threats and preserving business data will remain a major issue for companies over Christmas this year and in 2022. If there's one thing we've learned about cyberattacks in 2020 and 2021, it's that nothing is off-limits.   With...

    Read More
    Cybersecurity Vulnerabilities

    Cybercriminals can take advantage of various vulnerabilities in your company. Patching them up is crucial to protecting your reputation.   Taking your cybersecurity seriously is essential regardless of your organisation. Otherwise, criminals can easily halt your operations.   Take the University of Sunderland as an example.   At first, it seemed like they had a standard IT issue that they would quickly resolve. But they soon realised that they were a...

    Read More