logo

Select Sidearea

Populate the sidearea with useful widgets. It’s simple to add images, categories, latest post, social media icon links, tag clouds, and more.
[email protected]
+1234567890

Support: 0208 1668 716 | Sales: 0330 1224 420

Follow Us:

Recent Comments

    Email Tag

    Spam emails. Everyone hates them. It’s not just the emotional pain of clearing spam from your inbox. Having to do that is a real productivity killer, too. A recent report found that each one of your employees could be losing up to 80 hours each year, thanks to filtering and deleting spam emails. That’s a LOT of lost productivity. Anywhere between 45% and 85% of emails generated each day...

    Read More
    Frustrated Person at his Laptop to indicate that he fell victim to a phishing scam

    This new survey confirms what any IT professional could tell you: Phishing is still the most likely way for your business to be breached! A new survey just released by a specialist website has confirmed that phishing attacks remain the greatest cyber security threat to businesses. Phishing is where a hacker sends you an email pretending to be from someone else. They might fake an email from...

    Read More
    Microsoft 365 icons

    You may receive error messages below: Having Office 365 mailbox spread across multiple data centres can cause issues when accessing shared resources. The issue can demonstrate it self by an inability to send as a shared mailbox or losing access to it completely in Outlook or Web-mail. Outlook error The specified object was not found in the store., Can’t connect to the mailbox of user Mailbox database guid:...

    Read More
    Sextortion

    A new type of extortion email has been sneaking into inboxes over the last year. You may be familiar with the traditional ransom email. You would receive an email from a miscreant saying that your browsing habits have been recorded, and without sending a payment this sensitive information will be revealed to the world, to your family, to your colleagues.   What makes this new email particularly frightening to the receiver, is that these messages include a real password that was linked to their email address.  Quite often, these...

    Read More

    Hello there, my name is Ben and today I will talking you through how to set a user's permissions on office 365 using powershell. I shall be talking you through the steps to configure the permissions of an office 365 user to view another users mailbox. To configure a user to view another users mailbox, follow these steps: 1) This step will show you what your execution policy...

    Read More