Migrating from Google Workspace to Microsoft 365
Monday, 03 October 2022
Organisations of all sizes are moving from Google Workspace (formerly G Suite) to Microsoft 365 as their primary productivity platform. The move will help your business and your employees – we’ll get more into how later – but any IT project has the potential to cause issues, especially when it involves moving data across platforms.
- Published in Guidance
No Comments
Hotel Technology Due Diligence
Tuesday, 13 September 2022
A hotel can’t run well without up-to-date and effective technology. Gone are the days of handwritten logbooks and ‘analogue’ check-ins. Having outdated or broken technology is about as bad as having leaky pipes and bad insulation – both make your guests’ stay less pleasant, and their return less likely. Conducting a technology due diligence on
- Published in IT Consultancy
5 ways your employees can compromise your cyber security in 2022
Tuesday, 02 August 2022
More than 80% of UK businesses faced a cyberattack over the last year. Many of these attacks were caused by employees. It’s usually unintentional – the employees might not be well trained in cyber-security protocols, or worse yet, they may not be following that training. Here are 5 ways your employees could be a risk to your business’s cybersecurity.
- Published in Cyber Security
It is time to switch your ISDN to SIP for your business calling
Wednesday, 27 July 2022
A few years ago, Openreach announced that ISDN phone lines will be switched off in 2025. If your business is still using the outdated network, now is the time to switch. ISDN’s successor, SIP Trunking, is a faster, cheaper, and more flexible alternative. Any change can be daunting. Luckily, the switch from ISDN to SIP is likely
- Published in Guidance
How to Prevent Ransomware Attacks
Tuesday, 26 July 2022
Ransomware attacks are becoming a popular method of cybercrime. In 2021 alone, there were a reported 500 million ransomware attacks. Preventing these kind of attacks on your business is critical. Here we will discuss what ransomware is, how to prevent these attacks and what to do if you do become the victim of it. What
- Published in Cyber Security
Insider Threats
Monday, 20 June 2022
Cybersecurity infrastructure is vital for your business continuity. We have talked in previous blog articles about some of the best ways to keep your business safe from outside attacks. It is, however, important to remember that not all threats or attacks come from the outside. What are Insider Threats Insider threats come from within the
- Published in Cyber Security