Skip to content
Blog
Nick Spicer

OK Google, How Safe Are You Really?

Are you prompting Siri, Google, or Alexa? When you talk a home assistant, you join a growing number of smart homes. Smart home assistants search online, start phone calls, order groceries, play music, turn lights on. All with a single spoken command. Research into how people use Google or Alexa demonstrates the core features. Listening to music ranked first. Checking weather and asking for general information rounded out the top three. Setting timers and reminders, asking for the news or jokes (perhaps to make up for the news?) are also common. Yet, the question remains, just how safe are these virtual assistants? After all, having a smart speaker in your

Read More »
Blog
Nick Spicer

Remote IT Will Create Tech That Works for You

There are few things as frustrating as IT issues getting in the way of your work. Even the simplest of problems can break your flow, ruin your productivity, and waste your time. IT should be working to boost your day instead of slowing you down. Tripping up on a computer glitch can happen at any moment. Working to fix one can take hours. You might try a few steps that have worked before, ask a colleague for help, or try a web search to see what turns up. All of these take time from you or your colleagues, and often make the original problem worse. When you outsource your help

Read More »
Blog
Nick Spicer

Is There A Safe Way to Use The Cloud?

Cloud technology has grown to new heights in recent years. Ten years ago ‘the cloud’ was jargon almost nobody was aware of, today it is a phrase used almost daily in offices worldwide. More and more businesses today are taking advantage of the huge benefits cloud services have to offer. The sudden and widespread adoption of this new technology has raised questions too. Some want to fully understand what the cloud is before committing their vital company data to it. Most want to find out what the cloud can do for them. Everyone wants to know, is it safe? What Is The Cloud? The Cloud is an abstract name for

Read More »
Blog
Nick Spicer

What Can An MSP Do to Kickstart Your Business

Business today relies on technology in a way which we have never seen before. It makes up the core of almost every firm currently in existence. Today going digital impacts small companies more than large ones; it can make new opportunities possible and accelerate your path to success. The advantages of modern technology to small business is likely to be present already within your firm, but so too are the disadvantages. Faster transactions, quicker payment, accurate inventory, and improved customer outreach serve to boost our capabilities. While complex set-up, systems management, and ever-present security threats hold us back from our full potential. Managed Service Providers (MSPs) can eliminate the drawbacks,

Read More »
Blog
Nick Spicer

Repairing Your Computer Quicker for Less

Have you started to notice your computer’s niggles, flaws, and problems growing more severe and more frequent over recent months? These issues can irritate you daily, stop you from doing critical tasks, and even put your data in danger. It may be time to book in your computer for a brief service check or repair to get back on track. When booking your PC in for a service, you can help your technician get straight to the root of the problem. A few simple notes is all it takes. Many people drop off their computers with, at best, a brief and vague description of the problem they experience. Technicians have

Read More »
Blog
Nick Spicer

Has Your Email Been Hijacked?

A common complaint by many users in recent months has been spam emails appearing to come from their own accounts. Despite not knowing why, reports of friends, family, and contacts receiving spam email that appears to come from them has worried many people. Some have had their accounts suspended or shut down by their service providers as a result. For many, this experience can be highly disruptive. It’s a problem that can cause many issues in both your professional and personal life. The key to defense is learning how these attacks happen, and figuring out what you can do to protect yourself and your contacts against them. Hackers Using Your

Read More »
Blog
Nick Spicer

Don’t Fall Victim to Webcam Blackmail

Many users have reported recent scam messages from individuals claiming to have intercepted their username and password. These messages often state they have been watching your screen activity and webcam while you have been unaware. Typically, attackers threaten to broadcast footage to your contacts, colleagues, or social media channels. Demanding payment in Bitcoin, malicious hackers blackmail their victims to keep confidential information private. Where Have the Attacks Come From? In many cases where hackers have claimed to have a victims’ password, this has turned out to be true. In the last few years alone, many large websites have suffered enormous hacks which have released confidential details on many of their

Read More »
Blog
Nick Spicer

Professional Businesses Deserve Professional Setup

Watching a business grow is as satisfying as it is rewarding. Whether opening a new office, starting a new department, or bringing in a new employee; it’s a positive step in the right direction. Upward growth often requires new office tech and IT changes to bring new staff fully online. At a minimum, a new computer will be needed for employees to get started quickly and hit the ground running. New staff or an entire department may require a server, printer, or additional networking hardware to cope with extra demand. A tech smart business should give careful consideration to how it sources and sets up its hardware and software. It

Read More »
Blog
Nick Spicer

Is Your Physical Security as Good As Your Cybersecurity?

Headlines are often made by firms that have been hacked by “elite” cybercriminals. These events sound high tech, sophisticated, and interesting. The truth is almost always an amateur attacker chancing their luck with an unpatched security hole or bad password. Physical break-ins affect businesses far more commonly and cause much more damage, but get talked about far less. Similar to technology hacks, most physical security threats come from criminals that chance their luck on businesses that look poorly secured. On a rare occasion, they may strike a business owner that has forgot to lock up or failed to set the security alarm. By breaking in, these criminals exploit poor physical

Read More »
Blog
Nick Spicer

Invest Well in Your IT Security

“If it ain’t broke, don’t fix it” is a common and useful rule for many business owners. It serves to protect your business against unnecessary costs and unneeded downtime. While protecting your business against many types of danger, it poses an outright threat when it comes to IT security. Security threats to your firm move so fast that your IT should be working twice as hard as your company just to keep up. Every day, hundreds of thousands of new malware threats are released. Falling even hours behind means any one of these attacks can threaten your business. The single most dangerous thing IT security can do is stand still.

Read More »
Blog
Nick Spicer

SSD: Make Your Old Computer Your New Computer

The solid-state drive (SSD) has swiftly become the go-to upgrade to breathe new life into an ageing computer, and for good reason too. An SSD swiftly brings an old laptop or desktop up to date with modern machines in just a single step. The price of solid-state memory has fallen dramatically in recent years. As costs have dropped, the popularity of the technology has increased exponentially. At one time an SSD was a rare treat for serious PC enthusiasts, now it’s cheaper and more readily available than ever. No other single solution is as cost-effective, quick to swap, and impressively effective as swapping out an old hard drive in favor

Read More »
Blog
Nick Spicer

Don’t Get Hooked by Spear Phishing Attacks

Phishing attacks have been around for a long time in IT. Designed to steal your credentials or trick you into installing malicious software, they have persisted in the IT world precisely because they have been so devastatingly simple and effective. Today, a more modern and more effective version of the same attack is commonly used. A typical phishing attack involves an attacker sending out a malicious email to hundreds of thousands, if not millions of users. The attacker’s email is designed to look like it comes from a bank, financial service, or even the tax office. Often aiming to trick you into logging in to a fake online service, a

Read More »