CALL US: 01292 811 810

All businesses should adopt MFA. Now

If you log into any of your devices and apps with just a username and a password, then you’re using one piece of ID – or one ‘authentication factor’. And that’s just not enough. We recommend using MFA. That’s Multi-Factor Authentication. And it adds extra layers of security to your business. With MFA, you’ll need other unique ways to show it’s you. Those extra factors might be a code sent to your phone. Or maybe…

Don’t forget your phone when you think about cyber security

Our phones are a goldmine of private information. Just think of all the financial details, personal messages, banking apps, photos and contact information that live behind that little glass screen. And if your team use phones for work, they’ll often have access straight into company systems – email, contact lists, network access, file systems. So if they’re not kept as secure as any other device in your workplace, they can become a gaping hole in your…

Let’s start talking about AI

The whole world is suddenly talking about Artificial Intelligence. From Alexa in your kitchen, to Siri on your phone, AI is already all around us, but new names like ChatGPT, Dall-E, Jasper and more feel like they’ve blown up the internet. These new concepts take things WAY further, helping us to write articles, search the web with natural conversation, generate images, create code, and introduce new ways to make our daily lives even easier. But…

The 3 most important areas to discuss with your technology partner (jargon-free)

IT support is a technical job, and some of the language used can be a bit, well… technical. We always stay away from jargon when we’re working with our clients. So here’s our jargon-free look at the 3 most important areas to discuss with your technology partner. Number one is infrastructure. That’s your entire tech system – your network, your servers, and all the devices you use to get the job done. The right choices…

Cyber attacks are getting bigger and smarter. Are you vulnerable?

Have you ever tried to buy tickets for a huge event and found that the seller’s website has collapsed under the weight of thousands of people all trying to do the same thing at the same time? The ticket site falls over – usually temporarily – because the server is overloaded with traffic it doesn’t have the capacity for. Criminal Distributed Denial of Service attacks – DDoS, for short – exploit the same principle. When a DDoS…