Cryptolocker – What is it?

Cryptolocker – What is it?

Ransomware, Reyptson, Leakerlocker. These are all terms for some of the most common threats to your IT systems. Before I start and get into the nitty gritty – IT security is a bit like insurance. There’s rarely a need or want, to think the unthinkable scenarios.   ...
5 step business guide to changing IT provider

5 step business guide to changing IT provider

In this article, we outline the key areas to cover when changing IT provider. This is going on the assumption that your business has either: 1) A fully outsourced IT provider is providing relevant IT services. 2) Internal IT department/staff that require 3rd party...
Why Ad-Hoc IT Support is bad for your Business

Why Ad-Hoc IT Support is bad for your Business

If you’re an IT professional, I think you agree with me when I say ad-hoc IT support for businesses is a broken model. The technology now exists to help all business types become more efficient in their day to day business, and it needn’t cost the earth. In today’s...
5 steps to inbox zero

5 steps to inbox zero

If you’re anything like me you’ll know just how much emails are a massive time suck in the day to day running of your business. Over the years managing the email inbox has become a daily chore that just gets more difficult with time. In this article I’m going to...