Microsoft’s next version of Windows is being rolled out later this year, and businesses are now wondering if the upgrade is right for their needs. This article looks at the changes and helps you weigh up the pros and cons of upgrading. Continue reading
There’s been a lot in the news over the last few weeks about ransomware attacks. As the media can give people the wrong impression let me clear up some things for you. Continue reading
You may think it is a bit of fun to type in your answers to the quiz, which asks silly questions such as your nickname and first model of car? You may think it is some plain old fun, but many of these social media questionnaires are set up by hackers to steal your identity. Continue reading
If you get hit with ransomware there will be a number of indications, including:
- A screen telling you that your business files are encrypted.
- You can’t open any of your documents.
- Your files may have a weird extension of different icon.
- there will be instructions for how to pay up to recover your files.
This blog article details a number of steps you can take instead of paying the ransom straight away. Continue reading
Data breaches and leaks are now, unfortunately, becoming a regular occurrence and can happen to any business or individual. One of the biggest leaks only happened recently when 533 million Facebook records were released. Continue reading
Shadow IT are the things that employees download onto a business system that management and / or the IT department doesn’t know about, and it can be a big problem. Continue reading
Back in the day, the advice was to change your passwords often.
That is now bad advice. Continue reading
A laptop can hold your entire business life and in most cases, it is essential for your job. Thus you need to keep it in great shape and not physically damage it. Here are some tips on how to protect your laptop. Continue reading
Proprietary information makes your business special, whether you’re a startup with a unique take on an area or a food manufacturer with a secret sauce. Regardless of industry, businesses gain a competitive advantage from distinct practices or unique data. The last thing you want is someone with ill intent getting their hands on your differentiators. Here are some tips on how to protect your proprietary information. Continue reading
Microsoft continually adds new features and functionality to its M365 (or O65) range of products. One such product it MS Power Automate. It is a great tool that can easily increase your productivity. This blog aims to show you what you need to know about Microsoft’s Power Automate. Continue reading