Skip to content
Blog
Nick Spicer

EBOOK: 5 Reasons Your Business Needs Office 365 Today

You have probably been using Microsoft Office for a long time, but have you seen what you are missing out on with Office 365? It makes work so much easier. If you’ve been putting off the switch to Office 365 because you “already have Office”, prepare for a real eye-opener! We’ll break down the benefits, what they mean, and what you’ve been missing out on. Including: Near-zero learning curve True mobility in your workplace Cost savings across the board Review our article on 7 bonuses for small business in Office 365. 5 Reasons Your Business Needs Office 365 TodayDownload our free e-book now and discover what you have been missing
Read More »
Blog
Nick Spicer

Why Periodic Security Assessments Should Be Your New Normal

By now you know that building up your cyber security is just as important as building up your cash flow. Both are essential to your success, but while most businesses keep an eye on the financials, they tend to think cybersecurity is something they can set and forget. Unfortunately, cybercriminals are constantly coming up with new methods of attack and the security you had in place yesterday may not be sufficient today. Instead of reacting to breaches and taking on the costs of downtime, lost files and destroyed trust, a periodic security assessment can identify blind spots that place you at risk. Once you know about these problems, you’re able

Read More »
Blog
Nick Spicer

Should You Let an Amateur Loose on Your Network?

Most of us know a fair amount about computers, even kids are joining circuits and coding programs in schools – but that does that make everyone an IT expert? It’s fair to say almost all workplaces have that employee who can finesse the printer or use shortcuts nobody else knows about. They have skills, absolutely, but they often know just enough to be dangerous to your business. Hobby IT skills are learned on home computers which are very different to a professional business setup. When something goes wrong on a home computer, there’s no drastic impact if parts need to be replaced, data is lost or it stays down for

Read More »
Blog
Nick Spicer

Why Your Business Needs Unified Threat Management

Sounds scary doesn’t it? Almost like a swat team dressed in black is going to swing in and start yelling orders. While just as effective at disabling the bad guys, Unified Threat Management (UTM) is a special kind of IT solution focused on proactive protection. Consider it more like a team of virtual bodyguards that stand at the door between your business and the internet, keeping trouble out while your legitimate traffic can come and go normally. With the increasing number of connected devices in your business network and the different ways your employees now connect, it’s more important than ever to set up dedicated security systems that give integrated

Read More »
Blog
Nick Spicer

Should You Pay for a Ransomware Attack?

Getting hit with a ransomware attack is never fun, your files get encrypted by cybercriminals and you’re left having to decide: should we pay to get them back? It’s a scene that’s played out across the world with 70% of businesses saying ‘yes’ in 2016 alone. Here’s what you should consider if you’re ever in this situation. Do you trust them? Besides the fact that they’re criminals holding your data hostage, how confident are you that they’ll send the decryption key? Most attackers demand you send the payment via untraceable Bitcoin, so you have no recourse if they take it and run. You’re also equally trapped if they decide they

Read More »
Blog
Nick Spicer

Shopping for a New Computer?

It’s a decision that comes with equal doses of excitement and overwhelm: getting a new computer! Unlike popping out to the shops for a new toaster, choosing the right computer comes with so many questions, most of which are usually asked in some sort of alien language. Helpful sales people offering RAM as it were a side of fries, measuring CPU speeds in ‘cores’, and listing specs that mean nothing around what you actually want to do. That’s where we start. Not with tricky language that only makes sense to other computer geeks, we simply find out what you plan to use your computer for, then help you do it.

Read More »
Blog
Nick Spicer

What’s Best for Your Computer: Shut Down or Sleep?

Most homes are trying to reduce power costs by turning off lights and appliances, but do the same rules apply to computers? After all, it requires more than flicking a switch on your way out the door. Some people believe you should shut down after every use to save wear and tear, others believe you should never shut down your computer – ever. Others simply want to make sure the pages and apps they left open are still there waiting for them. So, who’s right and what are they really doing? Back when computers were clunky behemoths that took a long time to start, you’d go nuts at the person

Read More »
Blog
Nick Spicer

The True and Unexpected Costs of Being Hacked

There are the normal costs everyone associates with a breach, like getting your own server and computers fixed up, with maybe a little downtime. But really, most businesses view the possibility of getting hacked as more of an inconvenience than a bottom-line cost. For those who’ve come out the other side though, it’s a very different story. They know the hidden and ongoing costs of a data breach can be crippling, and that IT security exists to protect your business on multiple levels. All those surprise costs that spiral out of control are why most businesses close after a cyber-attack. Here are a few of the hard, but common realities

Read More »
Blog
Nick Spicer

Fake Invoice Attacks Are on the Rise – Here’s How to Spot (and Beat) Them

Businesses around the world are being struck with a cyber-attack that sends victims a fake invoice that looks real enough to fool to most employees. It’s an old scam that used to see bills faxed or mailed in, but it’s made its way into the digital world and instances are on the rise. Chances are you’ve already seen some of the less effective attempts, like an email advising your domain is expiring, except it’s not from your host and your domain is nowhere near expiration. These new attacks are more advanced, in that they look completely legitimate and are often from contractors/suppliers you actually use. Logos are correct, spelling and

Read More »
Blog
Nick Spicer

Why do Computers Break?

We know computers always break at the worst possible time, but what exactly prompts that failure? It’s easy to think it was something you did since you were using it at the time, but while your online gaming frenzy might cause a temporary crash, normal user actions are rarely the cause of a broken computer. Physical Damage Accidents happen, but they don’t always mean you need to buy a new computer. As an electrical item, liquid spills are a big problem. This could be anywhere from a spill on the keyboard, going overboard with the screen cleaning spray or even a flood that reaches the computer. Laptop users need to

Read More »