


All About Leased Lines
Hello! This week, we’re going to explain what leased lines are and why they could be worth considering for your business. If you’re looking at ways to connect your business to the internet, you might think that broadband is your only option. But did you know that there is another…
An Introduction to Internet of Things
This week, we’re going to explain what Internet of Things (IoT) is about and why it could be worth investigating for using in your business. First of all, what is Internet of Things (IoT)? The Internet of Things (IoT) refers to a network of physical devices that are embedded with sensors, software,…
Copilot for Microsoft Teams – Videos from Microsoft
Microsoft have released a number of videos explaining the Copilot features available when using it with Microsoft Teams. Please find these below. 1.With so many meetings and so little time, organising meeting action items so you can get to what's important quickly is essential. Watch this video for a demo…
All About Endpoint Security
Hackers continue to target endpoints, with research showing that 70% of breaches worldwide originate at an endpoint. Add that to the fact that IT networks have an increasing number – and wider variety - of endpoints, it is more important than ever to ensure your endpoints are secure. First…
Poor Security at the Electoral Commission Let Hackers Access 40 Million Voters’ Details
You may have seen the recent news that the Electoral Commission has been formally reprimanded by the Information Commissioners Office (ICO) over a cyberattack which occurred in 2021. The ICO found voters’ personal details were left “vulnerable to hackers” because passwords were not changed and the Electoral Commission’s software had…
July 2024 Newsletter
Hello, Welcome to our July 2024 newsletter update. I.T. in the Cloud vs. I.T. in the Office - Which is the better choice? In the ever-evolving landscape of IT, trends often come full circle. One such phenomenon is the resurgence of on-premise workloads. Despite the rise of cloud computing and…